This is a dedicated watch page for a single video.
After identifying and classifying a spear-phishing attack targeting your organization's executives, you need to mitigate the threat while causing the least disruption to the executive's workflow. What would be your next steps in mitigating this spear-phishing attack?