Clicking a malicious link or giving away corporate credentials: employee initiated cyber attacks Phishing techniques: how criminals are using phishing techniques for a variety of scams, sabotage and theft Decreasing risk: how we can educate staff and change dangerous behavior