Skip to main content

How Is an Open Audit for a Simulated Phish Recorded?