Your company is participating in a Cyber Security Education Program.


This Account Verification Phishing Attack included the following social engineering techniques:


  1. Email which would be associated with your work email (example: payroll).
  2. A time limit before account deactivation.
  3. Use of your email to personalize the message.
  4. Spoofed domain from a company aligned with email (example: adp.lang-en.ca).
  5. Simplified button/hyper link using spoofed domain to make it easy to engage.


How to spot this was a phishing email:


  1. Was this an email you expected to receive? No - Be cautious
  2. Was there a notice of a change of provider or service?
  3. The sender named email address was generic (example: register@lang-en.ca)
  4. The primary domain was not correct/spoofed off the actual company domain (example: adp.ca is official domain)
  5. The link provided used suspicious/spoofed domain similar to above (example: adp.lang-en.ca).


“An employee is either an asset to your cyber security or a risk.”