Frequently Asked Questions
1.How are our data protected and privacy ensured? Your data is securely stored and privacy is maintained. Industry-standard encryption methods and authentication are used for data security. For more information, please visit our Privacy Policy.
2.How does this application prevent illegal or malicious usage? Our application monitors users and performs automatic analysis to prevent illegal or malicious usage. When suspicious activities are detected, immediate actions are taken, and investigations are initiated.
3. Can users provide feedback regarding Tracking and Training Assignments? Yes, users can provide feedback. For feedback related to tracking and training assignments, please reach out to our support team.
4. What encryption and security measures are used for data security? Data security is maintained using AES-256 bit encryption. Additionally, extra security measures such as multi-factor authentication and strong password requirements are in place.
5. Does PHISHY support API integrations and customizations? Yes, our application supports PHISHY, API integrations, and customizations. For more information, please visit the documentation section.
6. What attack tactics do the training courses cover? The training courses cover various common attack tactics, including phishing, spear-phishing, malware, and more. They educate and raise awareness among users about these tactics.