<\/path><\/svg><\/a><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"How prepared is your business for a phishing attack? With cybercriminals becoming more sophisticated in their tactics, staying ahead of the game and protecting yourself from falling victim to these scams is crucial. By simulating real-world phishing threats, you can train your employees to spot and handle these attacks, significantly reducing the risk of data […]<\/p>\n","protected":false},"author":2,"featured_media":4235,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[8],"tags":[120],"uagb_featured_image_src":{"full":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/11\/Phishing-Simulation-Testing.jpg",1200,600,false],"thumbnail":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/11\/Phishing-Simulation-Testing-150x150.jpg",150,150,true],"medium":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/11\/Phishing-Simulation-Testing-300x150.jpg",300,150,true],"medium_large":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/11\/Phishing-Simulation-Testing-768x384.jpg",768,384,true],"large":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/11\/Phishing-Simulation-Testing-1024x512.jpg",1024,512,true],"1536x1536":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/11\/Phishing-Simulation-Testing.jpg",1200,600,false],"2048x2048":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/11\/Phishing-Simulation-Testing.jpg",1200,600,false],"woocommerce_thumbnail":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/11\/Phishing-Simulation-Testing-300x300.jpg",300,300,true],"woocommerce_single":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/11\/Phishing-Simulation-Testing-600x300.jpg",600,300,true],"woocommerce_gallery_thumbnail":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/11\/Phishing-Simulation-Testing-100x100.jpg",100,100,true]},"uagb_author_info":{"display_name":"John Iannarelli","author_link":"https:\/\/fbijohn.com\/author\/john-i\/"},"uagb_comment_info":0,"uagb_excerpt":"How prepared is your business for a phishing attack? With cybercriminals becoming more sophisticated in their tactics, staying ahead of the game and protecting yourself from falling victim to these scams is crucial. By simulating real-world phishing threats, you can train your employees to spot and handle these attacks, significantly reducing the risk of data…","_links":{"self":[{"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/posts\/4231"}],"collection":[{"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/comments?post=4231"}],"version-history":[{"count":6,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/posts\/4231\/revisions"}],"predecessor-version":[{"id":4540,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/posts\/4231\/revisions\/4540"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/media\/4235"}],"wp:attachment":[{"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/media?parent=4231"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/categories?post=4231"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/tags?post=4231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}