G DATA Phishing Simulation What happens to sensitive data entered by a participant via a link? Answer: This data is not stored by us and cannot be viewed by us. Which categories are considered in a G DATA phishing simulation? Can I abort a phishing simulation?