Tailor the teaching to community IT personnel/administrators and various essential team determined by appropriate organizational cyber threats and TTPs, such as Volt Typhoon. As an example, talk that Volt Typhoon actors are recognised to focus on particular e-mail accounts of IT workers, and persuade staff to protect their own e-mail accounts by ut