Your company is participating in a Cyber Security Education Program.


This Two Factor Activation (2FA) Phishing Attack included the following social engineering techniques:


  1. A lure email, an email sent prior with no malicious information, to lower your guard and expect the phishing email.
  2. Email name included your company domain (example: admin@yourcompany.com)
  3. Email name includes <fake email> to appear as the "real" email used to distract you; this is associated with #2
  4. Subject to appear critical (example: Security Update/Action Required)
  5. Time bound (example: ... execute within 24 hours ...)


How to spot this was a phishing email:



  1. From email address ("real" at end; after <fake email>) is some random domain not associated with your company or any software product used (example: @reset-outlook.com is not associated with your company)
  2. The link provided references a domain not associated with your company (example: reset-outlook.com); however a domain which resembles a product you might use.
  3. This email was/may have been filtered and in your junk mail folder.


“An employee is either an asset to your cyber security or a risk.”