Chapter 7 | Remediation In this chapter, Bob discusses how to effectively use the results from your phishing simulations. Book traversal links for Chapter 7 | Remediation ‹ Chapter 6 | Phishing Examples Up