BullPhish ID March 6, 2026 content updates
Training courses
The following new training courses are now available in the Training portal:
| Category | Title | Description |
|---|---|---|
| Phishing |
AI-Powered Phishing – Smarter Scams, Higher Risks |
AI-powered phishing uses artificial intelligence to create highly convincing scams that trick people into giving up information or money. This training explains what AI-powered phishing is, why it matters, and how you can protect yourself and your organization. |
| Phishing |
Tax Season Scams and How to Stop Falling for Them |
Tax season creates urgency and stress. Attackers use that pressure to trick people into sharing personal and financial information. This course explains common tax-related scams and how you can avoid becoming a victim. |
| Phishing |
Valentine's Day Scams Attackers Love |
Valentine’s Day is about connection and generosity. Attackers take advantage of those emotions to run scams that steal money, personal data, and account access. This course explains the most common Valentine’s Day scams and how to avoid them. |
| Phishing | Phishing: Why it Works and How to Spot It | Phishing works because it targets people, not systems. This course explains why phishing is so effective, what makes messages convincing, and how you can recognize the warning signs before damage occurs. |
| Phishing | How to use banners on Inky | This walkthrough introduces how to use the Inky email assistant and understand its color coded banners to evaluate email safety. You will learn what each banner means, including gray neutral, blue known external or internal, yellow caution, and red danger, and how to respond appropriately to protect yourself and your organization. By staying vigilant and using Inky’s reporting tools, you help strengthen security and reduce future email risks. |
The following updated training courses are now available in the Training portal:
| Category | Title | Description |
|---|---|---|
| Compliance Regulations Education |
PIPEDA and Provincial Privacy Statutes |
Canada’s privacy framework combines a federal law with provincial statutes. This course explains how PIPEDA works alongside provincial privacy laws and what that means for handling personal information. |
| Compliance Regulations Education |
PIPEDA Overview |
The Personal Information Protection and Electronic Documents Act, or PIPEDA, is Canada’s federal private-sector privacy law. This course explains what PIPEDA is, why it matters, and how you can protect personal information in your daily work. |
| Compliance Regulations Education |
PIPEDA: The 10 Principles |
PIPEDA is built on ten privacy principles that guide how organizations handle personal information. This course explains what those principles are, why they matter, and how they show up in everyday work. |
|
Phishing |
How to Avoid Phishing Scams |
In this course, you will learn how to spot phishing emails and examine why it is essential to report them. |
|
Phishing |
Introduction to Phishing |
Phishing is the most common attack used by cybercriminals to gain wrongful access to computer systems. In this course, you’ll examine the components of phishing and its various attack types. You'll learn how to identify a phishing attack and the steps to take if you suspect you have received a phishing email. |
|
Phishing |
Common Phishing Attack Methods |
Phishing is the most common attack used by cybercriminals to gain wrongful access to computer systems. In this course, you’ll examine the common phishing attack methods: pretexting, malicious links, and malicious attachments. |
|
Data Protection & Privacy |
Data Privacy in the US |
Data privacy in the United States focuses on how organizations collect, use, store, and share personal information. This course explains the US privacy landscape, why privacy risks matter, and how you can help protect personal data in your daily work. |
The following translated* training courses are now available in the Training portal:
(*All French courses are titled in their native language.)
| Category | Title | Languages |
|---|---|---|
| Phishing |
Annual Training - Phishing & Ransomware (~25m) VO |
Dutch, French-Canadian, German, Portuguese, Spanish |
| Password Protection and Best Practices |
Annual Training - Credential Security (~20m) VO |
Dutch, French-Canadian, German, Portuguese, Spanish |
| Data Protection & Privacy |
Annual Training - Data Protection & Insider Risk (~20m) VO |
Dutch, French-Canadian, German, Portuguese, Spanish |
| Security Awareness |
Annual Training - Modern Workplace Threats (~20m) VO |
Dutch, French-Canadian, German, Portuguese, Spanish |
| Compliance Regulations Education |
EU GDPR: What is GDPR? VO |
Dutch, French-Canadian, German, Portuguese, Spanish |
| Compliance Regulations Education |
UK GDPR vs EU GDPR VO |
Dutch, French-Canadian, German, Portuguese, Spanish |
| Compliance Regulations Education |
EU GDPR for Data Processors VO |
Dutch, French-Canadian, German, Portuguese, Spanish |
| Compliance Regulations Education |
EU GDPR for Data Breach Notification for Processors: Organization’s Next Steps VO |
Dutch, French-Canadian, German, Portuguese, Spanish |
| Compliance Regulations Education |
NIS 2 Directive (Network and Information Systems Directive) Introduction VO |
Dutch, French-Canadian, German, Portuguese, Spanish |
| Compliance Regulations Education |
EU GDPR: Consequences of GDPR Release VO |
Dutch, French-Canadian, German, Portuguese, Spanish |
| Compliance Regulations Education | Digital Operational Resilience Act (DORA) Introduction VO | Dutch, French-Canadian, German, Portuguese, Spanish |
| Compliance Regulations Education | EU Cybersecurity Act (CSA) Introduction VO | Dutch, French-Canadian, German, Portuguese, Spanish |
| Phishing | Introduction to Business Email Compromise VO | Dutch, French-Canadian, German, Portuguese, Spanish |
| Security Awareness | Physical Security: Shoulder Surfing VO | Dutch, French-Canadian, German, Portuguese, Spanish |
| Phishing | Introduction to Phishing VO | Dutch, French-Canadian, German, Portuguese, Spanish |
| Phishing | Common Phishing Attack Methods VO | Dutch, French-Canadian, German, Portuguese, Spanish |
|
Cyberthreat Education |
Ransomware Basics VO | Dutch, French-Canadian, German, Portuguese, Spanish |
| Password Protection and Best Practices | Introduction to Protecting Credentials VO | Dutch, French-Canadian, German, Portuguese, Spanish |
| Password Protection and Best Practices | The Basics of Multi-Factor Authentication VO | Dutch, French-Canadian, German, Portuguese, Spanish |