{"id":798,"date":"2022-10-13T04:22:26","date_gmt":"2022-10-13T04:22:26","guid":{"rendered":"https:\/\/rwts.com.au\/cybersecurity\/?page_id=798"},"modified":"2024-06-18T01:42:29","modified_gmt":"2024-06-18T01:42:29","slug":"phishing-and-cyber-security-training","status":"publish","type":"page","link":"https:\/\/rwts.com.au\/cybersecurity\/phishing-and-cyber-security-training\/","title":{"rendered":"Phishing and Cyber Security Training"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"798\" class=\"elementor elementor-798\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-40bc9602 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"40bc9602\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4d94b5ab\" data-id=\"4d94b5ab\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-66459abb elementor-widget elementor-widget-text-editor\" data-id=\"66459abb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/csdev.rwts.com.au\/\">Cyber Security Implementation<\/a>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d6a9b03 elementor-widget elementor-widget-heading\" data-id=\"6d6a9b03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Phishing &amp; Cybersecurity Training<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-30f2a3e3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"30f2a3e3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-18792503\" data-id=\"18792503\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7f61dfdf elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"7f61dfdf\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Certified Training <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23fa6663 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"23fa6663\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Delivery Cyber Security training within your organisation needn&#8217;t be hard. With our Automated, AI Driven phishing simulations, in all major languages, we can deliver personalised, individual cyber security training and simulations.<\/p>\n<p>With real-time reporting, simulations and ongoing education you can help to improve your organisations cyber security posture, reduce risk, and deliver continued education to your team.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-67ff9100\" data-id=\"67ff9100\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3be66f04 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3be66f04\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-728adb8 elementor-invisible\" data-id=\"728adb8\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;,&quot;animation_delay&quot;:1200}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4d0c9f2a elementor-widget elementor-widget-image\" data-id=\"4d0c9f2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"234\" height=\"300\" src=\"https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/CertifiedPhishedPartner_Logo_Navy-234x300.png\" class=\"attachment-medium size-medium wp-image-802\" alt=\"\" srcset=\"https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/CertifiedPhishedPartner_Logo_Navy-234x300.png 234w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/CertifiedPhishedPartner_Logo_Navy.png 490w\" sizes=\"(max-width: 234px) 100vw, 234px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fbfc0cd elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fbfc0cd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-8cc3258\" data-id=\"8cc3258\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a6b4514 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a6b4514\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-b6f7193 elementor-invisible\" data-id=\"b6f7193\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;,&quot;animation_delay&quot;:1200}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-da9bfb9 elementor-widget elementor-widget-image\" data-id=\"da9bfb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/Phished-Academy-Quiz-Phone_Whitelabel-169x300.png\" class=\"attachment-medium size-medium wp-image-800\" alt=\"\" srcset=\"https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/Phished-Academy-Quiz-Phone_Whitelabel-169x300.png 169w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/Phished-Academy-Quiz-Phone_Whitelabel-576x1024.png 576w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/Phished-Academy-Quiz-Phone_Whitelabel-768x1365.png 768w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/Phished-Academy-Quiz-Phone_Whitelabel-864x1536.png 864w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/Phished-Academy-Quiz-Phone_Whitelabel-1152x2048.png 1152w\" sizes=\"(max-width: 169px) 100vw, 169px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-24166dc\" data-id=\"24166dc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c704b23 elementor-widget elementor-widget-heading\" data-id=\"c704b23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why do i need it ? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c138ad elementor-widget elementor-widget-text-editor\" data-id=\"8c138ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Studies have shown that at least 50% of Employees are vulnerable to cybersecurity phishing attempts. With training, this reduces to 5%<\/p>\n<p>The training academy helps your employees and volunteers understand key cyber security concepts and learning and reducing risks to your business and data.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-48236766 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"48236766\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5149e76b\" data-id=\"5149e76b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7ba892fc elementor-widget elementor-widget-text-editor\" data-id=\"7ba892fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Expert guidance<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a061c4a elementor-widget elementor-widget-heading\" data-id=\"5a061c4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Stimulate Phishing Campaigns<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ed1acc3 elementor-widget elementor-widget-text-editor\" data-id=\"3ed1acc3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Get practice at identifying phishing emails before your organisation falls victim. With dynamically generated content, your employees get the opportunity to identify and report convincing and realistic phishing emails.<\/p>\n<p>Using advanced analytics and artificial intelligence, content is tailored to users based on their behaviour, ensuring that users are continually encouraged to identify and respond correctly.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-46db2eea\" data-id=\"46db2eea\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-56f816d5 elementor-widget elementor-widget-image\" data-id=\"56f816d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"171\" height=\"300\" src=\"https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/Platform_interface_phishing_simulation-171x300.png\" class=\"attachment-medium size-medium wp-image-801\" alt=\"\" srcset=\"https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/Platform_interface_phishing_simulation-171x300.png 171w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/Platform_interface_phishing_simulation-583x1024.png 583w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/Platform_interface_phishing_simulation-768x1348.png 768w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/Platform_interface_phishing_simulation-875x1536.png 875w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/Platform_interface_phishing_simulation.png 942w\" sizes=\"(max-width: 171px) 100vw, 171px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-436631f elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"436631f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8824ebe\" data-id=\"8824ebe\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c4e21e5 elementor-widget elementor-widget-heading\" data-id=\"c4e21e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Measure your RISk<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d7aa993 elementor-widget elementor-widget-text-editor\" data-id=\"d7aa993\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With realtime reporting, you can measure your organisational risk and incidents, and provide real-time feedback to your team and key stakeholders.&nbsp;<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d40a85e elementor-widget elementor-widget-image\" data-id=\"d40a85e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"450\" src=\"https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/Partnership_platform_Whitelabel-768x450.png\" class=\"attachment-medium_large size-medium_large wp-image-799\" alt=\"\" srcset=\"https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/Partnership_platform_Whitelabel-768x450.png 768w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/Partnership_platform_Whitelabel-300x176.png 300w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/Partnership_platform_Whitelabel-1024x600.png 1024w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/Partnership_platform_Whitelabel-1536x900.png 1536w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/Partnership_platform_Whitelabel.png 1816w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a462247 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"a462247\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4a8eaca\" data-id=\"4a8eaca\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fb1cf8b elementor-widget elementor-widget-heading\" data-id=\"fb1cf8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Get STARTED TODAY<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29e7087 elementor-widget elementor-widget-text-editor\" data-id=\"29e7087\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Getting started is easy. Our annual Annual packages start at $50 (ex GST) per user per year. Charities and NFP discounts are available.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a59927 elementor-align-left elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"1a59927\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"http:\/\/rwts.com.au\/cybersecurity\/contactus\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Annual Packages starting from $50 <\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-af06a8f\" data-id=\"af06a8f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5cee31b elementor-widget elementor-widget-image\" data-id=\"5cee31b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/11\/PHIST1-01-300x300.png\" class=\"attachment-medium size-medium wp-image-841\" alt=\"\" srcset=\"https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/11\/PHIST1-01-300x300.png 300w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/11\/PHIST1-01-1024x1024.png 1024w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/11\/PHIST1-01-150x150.png 150w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/11\/PHIST1-01-768x768.png 768w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/11\/PHIST1-01-1536x1536.png 1536w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/11\/PHIST1-01-2048x2048.png 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber Security Implementation\u00a0 Phishing &amp; Cybersecurity Training Certified Training Delivery Cyber Security training within your organisation needn&#8217;t be hard. With our Automated, AI Driven phishing simulations, in all major languages, we can deliver personalised, individual cyber security training and simulations. With real-time reporting, simulations and ongoing education you can help to improve your organisations cyber [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-798","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/pages\/798","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/comments?post=798"}],"version-history":[{"count":43,"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/pages\/798\/revisions"}],"predecessor-version":[{"id":868,"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/pages\/798\/revisions\/868"}],"wp:attachment":[{"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/media?parent=798"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}