How to Build a Phishing Playbook Part 4: Testing and Publishing

From d3security.com

Welcome to the fourth and final part of our How to build a Phishing Playbook series. If you haven’t read the other parts, take a look using the links below. In this part we’ll be running test data through our playbook, filling out the dynamic inputs, then publishing it to production.

Part 1: Preparation

Part 2: Wireframing

Part 3: Development

Read more…