Skip to main content

How is an Open Audit for a Simulated Phish Recorded?