Scammers are constantly evolving their tactics, and telephone-oriented attack deliveries (TOADs) are a prime example. These attacks combine phone calls and emails to deceive users into revealing sensitive information or installing malware.

In this Micro Training, learn how TOAD attacks work, why they’re so effective, and how to stay protected.

Quick Tips

  • Always look up a company’s official phone number instead of calling a number from a text or email.
  • Never install software from an outside source.