Attackers are consistently distributing malicious content over the internet, weather its hosting malware samples, credentials harvesting pages to steal user online credentials, or identifying and exploiting vulnerabilities on trusted pages. Without any additional protection measures employees, are left unattended and vulnerable.