Atlas Systems Named a Representative Vendor in 2025 Gartner® Market Guide for TPRM Technology Solutions → Read More
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Glossary › Phishing
What is Phishing?
Phishing uses deceptive emails, messages, or websites to gather credentials or deliver malware. Vendor employees can be targeted to compromise customer systems or data. In TPRM, a vendor’s phishing resilience impacts supply chain security.
FAQs
Are phishing attacks always email based?
No, they also occur via SMS and voice.
Can phishing bypass technical controls?
Yes, because it targets humans.
Do vendors need phishing training?
Yes, it reduces social engineering risk..
Responsible-AI TPRM Guide
Discover how risk teams apply AI responsibly to reduce third-party blind spots and stay audit-ready across global regulations.
Easier third-party onboarding. Seamless compliance. Complete risk control.