{"id":30952,"date":"2025-12-17T02:40:38","date_gmt":"2025-12-17T02:40:38","guid":{"rendered":"https:\/\/inspurtech.com.my\/?page_id=30952"},"modified":"2025-12-18T03:12:37","modified_gmt":"2025-12-18T03:12:37","slug":"email-security-phishing-training-malaysia","status":"publish","type":"page","link":"https:\/\/inspurtech.com.my\/zh\/email-security-phishing-training-malaysia\/","title":{"rendered":"Phishing Email"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"30952\" class=\"elementor elementor-30952\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-265001b elementor-section-height-min-height elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"265001b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-37d25b2\" data-id=\"37d25b2\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b070994 elementor-widget elementor-widget-heading\" data-id=\"b070994\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Advanced Email Security &amp; Phishing Training for Malaysian SMEs<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63f30bc elementor-widget elementor-widget-text-editor\" data-id=\"63f30bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"8\">It takes only seconds for a company to lose millions. A single email labeled \u201cUrgent: Outstanding Invoice\u201d can bypass standard spam filters and bring down your entire corporate network.<\/p><p data-path-to-node=\"4\">Statistics show that <b>19% of ransomware attacks<\/b> start with a phishing email. Often, these attacks slip right past standard <span style=\"color: #0095ff;\"><b><a class=\"ng-star-inserted\" style=\"color: #0095ff;\" href=\"https:\/\/inspurtech.com.my\/zh\/cybersecurity-threat-protection\/\" target=\"_blank\" rel=\"noopener\" data-hveid=\"0\" data-ved=\"0CAAQ_4QMahcKEwiyyPP3y8ORAxUAAAAAHQAAAAAQbw\">cybersecurity threat protection<\/a><\/b>.<\/span> In 2025, the threat is even bigger. Hackers don&#8217;t just send obvious scams anymore. They now use AI to write perfect, realistic invoices from vendors you trust. Your employees are your last line of defense. Is your <b>email security<\/b> strong enough to stop them?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e7fcff elementor-invisible elementor-widget elementor-widget-button\" data-id=\"2e7fcff\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"#Phishing\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Read More<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ab1bb2f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ab1bb2f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1cd5aea\" data-id=\"1cd5aea\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bdf319a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bdf319a\" data-element_type=\"section\" data-e-type=\"section\" id=\"Phishing\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e6c14e5\" data-id=\"e6c14e5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fa18446 elementor-widget elementor-widget-heading\" data-id=\"fa18446\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Your Default Microsoft 365 Security Isn't Enough?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df76720 elementor-widget elementor-widget-text-editor\" data-id=\"df76720\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"13\">Most SMEs assume their default email settings are a &#8220;shield.&#8221; However, sophisticated attackers now use <b>Social Engineering<\/b>\u2014impersonating your boss or a trusted local vendor\u2014to bypass traditional filters.<\/p><h3 data-path-to-node=\"14\"><b>The 4 Most Dangerous Email Threats in Malaysia<\/b><\/h3><ol start=\"1\" data-path-to-node=\"13\"><li><p data-path-to-node=\"13,0,0\"><b>Spear Phishing:<\/b> This is a targeted attack. Hackers check your LinkedIn to find your job title and current projects. This makes their email look real.<\/p><\/li><li><p data-path-to-node=\"13,1,0\"><b>Whaling:<\/b> These attacks target the &#8220;big fish,&#8221; like CEOs and CFOs. They often ask for urgent wire transfers or tax data.<\/p><\/li><li><p data-path-to-node=\"13,2,0\"><b>Clone Phishing:<\/b> Hackers copy a <i>real<\/i> email you received. They change the link to a virus and resend it. They might claim, &#8220;Resending this because the link was broken.&#8221;<\/p><\/li><li><p data-path-to-node=\"13,3,0\"><b>Quishing (QR Code Phishing):<\/b> Hackers send a PDF invoice with a QR code. Scanning it with your phone bypasses computer security and steals your mobile login.<\/p><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e8c2702 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e8c2702\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-23294cb\" data-id=\"23294cb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e3fae3d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e3fae3d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-32d1c21\" data-id=\"32d1c21\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-72f8dd4 elementor-widget elementor-widget-heading\" data-id=\"72f8dd4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The 9-Point Email Security Checklist<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10e02aa elementor-widget elementor-widget-text-editor\" data-id=\"10e02aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"15\">Print this list. Pin it to every employee\u2019s desk. Before clicking <i>anything<\/i>, check these 9 points to maintain total <b>email security<\/b>.<\/p><ol start=\"1\" data-path-to-node=\"16\"><li><p data-path-to-node=\"16,0,0\"><b>Sender Address:<\/b> Hover over the name. Is it <code>ceo@company.com<\/code> or <code>ceo@c0mpany.com<\/code>? Look for small typos.<\/p><\/li><li><p data-path-to-node=\"16,1,0\"><b>Generic Greetings:<\/b> Does it say &#8220;Dear Customer&#8221; instead of your name? Real vendors use your real name.<\/p><\/li><li><p data-path-to-node=\"16,2,0\"><b>Urgency:<\/b> &#8220;Pay within 2 hours or we delete your account.&#8221; Hackers use fear to make you rush.<\/p><\/li><li><p data-path-to-node=\"16,3,0\"><b>The Link:<\/b> Hover over the link (don&#8217;t click!). Does the text say &#8220;Microsoft Support&#8221; but the URL reads <code>freewebsitebuilder.com<\/code>?<\/p><\/li><li><p data-path-to-node=\"16,4,0\"><b>Attachments:<\/b> Be careful with <code>.zip<\/code>, <code>.exe<\/code>, or <code>.js<\/code> files.\u00a0<span style=\"font-style: inherit; font-weight: inherit;\">Even PDFs can now contain malicious scripts that require professional <\/span><span style=\"color: #0095ff;\"><b style=\"font-style: inherit;\"><a class=\"ng-star-inserted\" style=\"color: #0095ff;\" href=\"https:\/\/inspurtech.com.my\/zh\/virus-removal\/\" target=\"_blank\" rel=\"noopener\" data-hveid=\"0\" data-ved=\"0CAAQ_4QMahgKEwiyyPP3y8ORAxUAAAAAHQAAAAAQiAE\">virus removal<\/a><\/b><\/span><span style=\"font-style: inherit; font-weight: inherit;\">.<\/span><\/p><\/li><li><p data-path-to-node=\"16,5,0\"><b>The &#8220;Internal&#8221; Request:<\/b> Did your CEO email you for gift cards or a secret wire transfer? Walk to their office and ask. 99% of the time, it is fake.<\/p><\/li><li><p data-path-to-node=\"16,6,0\"><b>Odd Formatting:<\/b> Is the logo pixelated? Is the font different from usual?<\/p><\/li><li><p data-path-to-node=\"16,7,0\"><b>Unexpected Context:<\/b> Did you get a &#8220;Delivery Missed&#8221; note when you didn&#8217;t order anything?<\/p><\/li><li><p data-path-to-node=\"16,8,0\"><b>Password Requests:<\/b> Microsoft, Google, and your IT team will <i>never<\/i> ask for your password via email.<\/p><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3c314cf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3c314cf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1f1b8b0\" data-id=\"1f1b8b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d1934b4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d1934b4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f35023e\" data-id=\"f35023e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b39cc9f elementor-widget elementor-widget-heading\" data-id=\"b39cc9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why One-Time Training Fails<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea1e42b elementor-widget elementor-widget-text-editor\" data-id=\"ea1e42b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"18\">Many companies hold a security seminar once a year. This does not work. By the next week, employees forget 90% of what they learned.<\/p><p data-path-to-node=\"19\">Effective <b>email security<\/b> training must be continuous.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-278e7c3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"278e7c3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-a165375\" data-id=\"a165375\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8e7d978 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"8e7d978\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-crosshairs\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tMonthly Simulated Attacks\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tWe send safe, fake phishing emails to your staff.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-66b09db\" data-id=\"66b09db\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d932e64 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"d932e64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-comments\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tImmediate Feedback\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tIf they click, a pop-up explains what they missed.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-c538090\" data-id=\"c538090\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-55b2111 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"55b2111\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-trophy\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tGamification\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tReward employees who report bad emails. Make security a team sport, not a punishment.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dbb3d08 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dbb3d08\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-27a4bdb\" data-id=\"27a4bdb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-83fa6f2 elementor-widget elementor-widget-spacer\" data-id=\"83fa6f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b2dcd7b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b2dcd7b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dba9dc4\" data-id=\"dba9dc4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a330b25 elementor-widget elementor-widget-heading\" data-id=\"a330b25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Role of MFA (Multi-Factor Authentication)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f68b3d9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f68b3d9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-00d0a37\" data-id=\"00d0a37\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-749d2a1 elementor-widget elementor-widget-image\" data-id=\"749d2a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"513\" src=\"https:\/\/inspurtech.com.my\/wp-content\/uploads\/2025\/12\/3210-DataBackupSolution-scaled-e1765941375213-1024x513.png\" class=\"attachment-large size-large wp-image-31012\" alt=\"\" srcset=\"https:\/\/inspurtech.com.my\/wp-content\/uploads\/2025\/12\/3210-DataBackupSolution-scaled-e1765941375213-1024x513.png 1024w, https:\/\/inspurtech.com.my\/wp-content\/uploads\/2025\/12\/3210-DataBackupSolution-scaled-e1765941375213-300x150.png 300w, https:\/\/inspurtech.com.my\/wp-content\/uploads\/2025\/12\/3210-DataBackupSolution-scaled-e1765941375213-768x385.png 768w, https:\/\/inspurtech.com.my\/wp-content\/uploads\/2025\/12\/3210-DataBackupSolution-scaled-e1765941375213-1536x770.png 1536w, https:\/\/inspurtech.com.my\/wp-content\/uploads\/2025\/12\/3210-DataBackupSolution-scaled-e1765941375213-2048x1027.png 2048w, https:\/\/inspurtech.com.my\/wp-content\/uploads\/2025\/12\/3210-DataBackupSolution-scaled-e1765941375213-18x9.png 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ff835a1\" data-id=\"ff835a1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f44c473 elementor-widget elementor-widget-text-editor\" data-id=\"f44c473\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"22\">Even with great training, someone might click. This is where MFA saves you.<\/p>\n<p data-path-to-node=\"23\">If a hacker steals a password, MFA stops them from logging in. They cannot access the account without the employee\u2019s phone. <br><b>Rule:<\/b> Enable MFA on Email, VPN, and all Cloud Software. No exceptions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2b503c2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2b503c2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-334c257\" data-id=\"334c257\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-aca0072 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"aca0072\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b57ee02\" data-id=\"b57ee02\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e97d024 elementor-widget elementor-widget-heading\" data-id=\"e97d024\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Don't Blame the User, Equip Them<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e53f5e9 elementor-widget elementor-widget-text-editor\" data-id=\"e53f5e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"25\">Your employees are your first line of defense. A strong &#8220;Human Firewall&#8221; is better than software alone.<\/p><p data-path-to-node=\"26\">Is your team at risk? Conduct a <span style=\"color: #0095ff;\"><a style=\"color: #0095ff;\" href=\"https:\/\/wa.me\/601110986863\"><b>cyber security audit<\/b><\/a><\/span> with Inspur Tech. We run blind phishing simulations to see who clicks. Then, we help you build an <b>email security<\/b> program that works.<\/p><h5><b>Complete Your Security Shield:<\/b><\/h5><ul data-path-to-node=\"33\"><li><p data-path-to-node=\"33,0,0\"><b>Proactive Defense:<\/b> <a href=\"https:\/\/inspurtech.com.my\/zh\/email-security-phishing-training-malaysia\/\"><span style=\"color: #0095ff;\">Phishing Training &amp; Simulations<\/span><\/a><\/p><\/li><li><p data-path-to-node=\"33,1,0\"><b>Reactive Recovery:<\/b> <span style=\"color: #0095ff;\"><a style=\"color: #0095ff;\" href=\"https:\/\/inspurtech.com.my\/zh\/ransomware-proof-data-backup-malaysia\/\" target=\"_blank\" rel=\"noopener\" data-hveid=\"0\" data-ved=\"0CAAQ_4QMahgKEwjy8JKGjcaRAxUAAAAAHQAAAAAQ6wI\">Ransomware-Proof Data Backup<\/a><\/span><\/p><\/li><li><p data-path-to-node=\"33,2,0\"><b>System Cleaning:<\/b> <span style=\"color: #0095ff;\"><a style=\"color: #0095ff;\" href=\"https:\/\/inspurtech.com.my\/zh\/virus-removal\/\" target=\"_blank\" rel=\"noopener\" data-hveid=\"0\" data-ved=\"0CAAQ_4QMahgKEwjy8JKGjcaRAxUAAAAAHQAAAAAQ7AI\">Expert Virus &amp; Malware Removal<\/a><\/span><\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-99d9f81 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"99d9f81\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-cc4f915\" data-id=\"cc4f915\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-14f38e8 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"14f38e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/inspurtech.com.my\/wp-content\/uploads\/2021\/07\/cropped-LOGO_AC-300x300.png\" class=\"attachment-medium size-medium wp-image-24567\" alt=\"inspurtech company logo\" srcset=\"https:\/\/inspurtech.com.my\/wp-content\/uploads\/2021\/07\/cropped-LOGO_AC-300x300.png 300w, https:\/\/inspurtech.com.my\/wp-content\/uploads\/2021\/07\/cropped-LOGO_AC-150x150.png 150w, https:\/\/inspurtech.com.my\/wp-content\/uploads\/2021\/07\/cropped-LOGO_AC-270x270.png 270w, https:\/\/inspurtech.com.my\/wp-content\/uploads\/2021\/07\/cropped-LOGO_AC-192x192.png 192w, https:\/\/inspurtech.com.my\/wp-content\/uploads\/2021\/07\/cropped-LOGO_AC-180x180.png 180w, https:\/\/inspurtech.com.my\/wp-content\/uploads\/2021\/07\/cropped-LOGO_AC-32x32.png 32w, https:\/\/inspurtech.com.my\/wp-content\/uploads\/2021\/07\/cropped-LOGO_AC.png 512w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d881f80\" data-id=\"d881f80\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e49f4a5 elementor-widget elementor-widget-heading\" data-id=\"e49f4a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">We're here to help! Call Us Today!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa478d8 elementor-widget elementor-widget-button\" data-id=\"fa478d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/wa.link\/nc5ced\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-arrow-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Call Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Advanced Email Security &#038; Phishing Training for Malaysian SMEs It takes only seconds for a company to lose millions. A single email labeled \u201cUrgent: Outstanding Invoice\u201d can bypass standard spam filters and bring down your entire corporate network. Statistics show that 19% of ransomware attacks start with a phishing email. Often, these attacks slip right &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/inspurtech.com.my\/zh\/email-security-phishing-training-malaysia\/\"> <span class=\"screen-reader-text\">Phishing Email<\/span> \u67e5\u770b\u5168\u6587 &raquo;<\/a><\/p>","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-30952","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.9 (Yoast SEO v22.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Email Security &amp; Phishing Training Malaysia<\/title>\n<meta name=\"description\" content=\"Protect your team from fake invoices and BEC scams. Inspur Tech provides email security training and phishing simulations for Malaysian SMEs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/inspurtech.com.my\/zh\/email-security-phishing-training-malaysia\/\" \/>\n<meta property=\"og:locale\" content=\"zh_CN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing Email\" \/>\n<meta property=\"og:description\" content=\"Protect your team from fake invoices and BEC scams. Inspur Tech provides email security training and phishing simulations for Malaysian SMEs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/inspurtech.com.my\/zh\/email-security-phishing-training-malaysia\/\" \/>\n<meta property=\"og:site_name\" content=\"INSPUR TECH SDN. BHD. - COMPUTER SERVICE &amp; SOFTWARE DEVELOPMENT &amp; HRDF TRAINING\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/InspurTech\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-18T03:12:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/inspurtech.com.my\/wp-content\/uploads\/2025\/12\/3210-DataBackupSolution-scaled-e1765941375213-1024x513.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 \u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/inspurtech.com.my\/email-security-phishing-training-malaysia\/\",\"url\":\"https:\/\/inspurtech.com.my\/email-security-phishing-training-malaysia\/\",\"name\":\"Email Security & Phishing Training Malaysia\",\"isPartOf\":{\"@id\":\"https:\/\/inspurtech.com.my\/#website\"},\"datePublished\":\"2025-12-17T02:40:38+00:00\",\"dateModified\":\"2025-12-18T03:12:37+00:00\",\"description\":\"Protect your team from fake invoices and BEC scams. Inspur Tech provides email security training and phishing simulations for Malaysian SMEs.\",\"breadcrumb\":{\"@id\":\"https:\/\/inspurtech.com.my\/email-security-phishing-training-malaysia\/#breadcrumb\"},\"inLanguage\":\"zh-Hans\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/inspurtech.com.my\/email-security-phishing-training-malaysia\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/inspurtech.com.my\/email-security-phishing-training-malaysia\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"INSPUR TECH\",\"item\":\"https:\/\/inspurtech.com.my\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing Email\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/inspurtech.com.my\/#website\",\"url\":\"https:\/\/inspurtech.com.my\/\",\"name\":\"INSPUR TECH SDN. BHD. - COMPUTER SERVICE & SOFTWARE DEVELOPMENT & HRDF TRAINING\",\"description\":\"INSPUR TECH SDN. BHD. - COMPUTER SERVICE &amp; SOFTWARE DEVELOPMENT &amp; HRDF TRAINING\",\"publisher\":{\"@id\":\"https:\/\/inspurtech.com.my\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/inspurtech.com.my\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"zh-Hans\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/inspurtech.com.my\/#organization\",\"name\":\"INSPUR TECH SDN. BHD. - COMPUTER SERVICE & SOFTWARE DEVELOPMENT & HRDF TRAINING\",\"url\":\"https:\/\/inspurtech.com.my\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-Hans\",\"@id\":\"https:\/\/inspurtech.com.my\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/inspurtech.com.my\/wp-content\/uploads\/2021\/07\/INSPUR-TECH-LOGO-HD.png\",\"contentUrl\":\"https:\/\/inspurtech.com.my\/wp-content\/uploads\/2021\/07\/INSPUR-TECH-LOGO-HD.png\",\"width\":1162,\"height\":171,\"caption\":\"INSPUR TECH SDN. BHD. - COMPUTER SERVICE & SOFTWARE DEVELOPMENT & HRDF TRAINING\"},\"image\":{\"@id\":\"https:\/\/inspurtech.com.my\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/InspurTech\/\",\"https:\/\/www.youtube.com\/channel\/UCwLFbEkIyWQJvoBq-0qAtTg\/about\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Email Security & Phishing Training Malaysia","description":"Protect your team from fake invoices and BEC scams. Inspur Tech provides email security training and phishing simulations for Malaysian SMEs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/inspurtech.com.my\/zh\/email-security-phishing-training-malaysia\/","og_locale":"zh_CN","og_type":"article","og_title":"Phishing Email","og_description":"Protect your team from fake invoices and BEC scams. Inspur Tech provides email security training and phishing simulations for Malaysian SMEs.","og_url":"https:\/\/inspurtech.com.my\/zh\/email-security-phishing-training-malaysia\/","og_site_name":"INSPUR TECH SDN. BHD. - COMPUTER SERVICE &amp; SOFTWARE DEVELOPMENT &amp; HRDF TRAINING","article_publisher":"https:\/\/www.facebook.com\/InspurTech\/","article_modified_time":"2025-12-18T03:12:37+00:00","og_image":[{"url":"https:\/\/inspurtech.com.my\/wp-content\/uploads\/2025\/12\/3210-DataBackupSolution-scaled-e1765941375213-1024x513.png"}],"twitter_card":"summary_large_image","twitter_misc":{"\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4":"4 \u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/inspurtech.com.my\/email-security-phishing-training-malaysia\/","url":"https:\/\/inspurtech.com.my\/email-security-phishing-training-malaysia\/","name":"Email Security & Phishing Training Malaysia","isPartOf":{"@id":"https:\/\/inspurtech.com.my\/#website"},"datePublished":"2025-12-17T02:40:38+00:00","dateModified":"2025-12-18T03:12:37+00:00","description":"Protect your team from fake invoices and BEC scams. Inspur Tech provides email security training and phishing simulations for Malaysian SMEs.","breadcrumb":{"@id":"https:\/\/inspurtech.com.my\/email-security-phishing-training-malaysia\/#breadcrumb"},"inLanguage":"zh-Hans","potentialAction":[{"@type":"ReadAction","target":["https:\/\/inspurtech.com.my\/email-security-phishing-training-malaysia\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/inspurtech.com.my\/email-security-phishing-training-malaysia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"INSPUR TECH","item":"https:\/\/inspurtech.com.my\/"},{"@type":"ListItem","position":2,"name":"Phishing Email"}]},{"@type":"WebSite","@id":"https:\/\/inspurtech.com.my\/#website","url":"https:\/\/inspurtech.com.my\/","name":"INSPUR TECH SDN. BHD. - COMPUTER SERVICE & SOFTWARE DEVELOPMENT & HRDF TRAINING","description":"INSPUR TECH SDN. BHD. - COMPUTER SERVICE &amp; SOFTWARE DEVELOPMENT &amp; HRDF TRAINING","publisher":{"@id":"https:\/\/inspurtech.com.my\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/inspurtech.com.my\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"zh-Hans"},{"@type":"Organization","@id":"https:\/\/inspurtech.com.my\/#organization","name":"INSPUR TECH SDN. BHD. - COMPUTER SERVICE & SOFTWARE DEVELOPMENT & HRDF TRAINING","url":"https:\/\/inspurtech.com.my\/","logo":{"@type":"ImageObject","inLanguage":"zh-Hans","@id":"https:\/\/inspurtech.com.my\/#\/schema\/logo\/image\/","url":"https:\/\/inspurtech.com.my\/wp-content\/uploads\/2021\/07\/INSPUR-TECH-LOGO-HD.png","contentUrl":"https:\/\/inspurtech.com.my\/wp-content\/uploads\/2021\/07\/INSPUR-TECH-LOGO-HD.png","width":1162,"height":171,"caption":"INSPUR TECH SDN. BHD. - COMPUTER SERVICE & SOFTWARE DEVELOPMENT & HRDF TRAINING"},"image":{"@id":"https:\/\/inspurtech.com.my\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/InspurTech\/","https:\/\/www.youtube.com\/channel\/UCwLFbEkIyWQJvoBq-0qAtTg\/about"]}]}},"_links":{"self":[{"href":"https:\/\/inspurtech.com.my\/zh\/wp-json\/wp\/v2\/pages\/30952","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inspurtech.com.my\/zh\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/inspurtech.com.my\/zh\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/inspurtech.com.my\/zh\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/inspurtech.com.my\/zh\/wp-json\/wp\/v2\/comments?post=30952"}],"version-history":[{"count":38,"href":"https:\/\/inspurtech.com.my\/zh\/wp-json\/wp\/v2\/pages\/30952\/revisions"}],"predecessor-version":[{"id":31164,"href":"https:\/\/inspurtech.com.my\/zh\/wp-json\/wp\/v2\/pages\/30952\/revisions\/31164"}],"wp:attachment":[{"href":"https:\/\/inspurtech.com.my\/zh\/wp-json\/wp\/v2\/media?parent=30952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}