Your company is participating in a Cyber Security Education Program.


This Computer Usage Phishing Attack included the following social engineering techniques:


  1. IT originated email: (subject: "Computer usage policy.")
  2. Timing critical (ex: Violations may result in disciplinary action ...)
  3. From email name used as subject to mask fictious email address ("Head Office")


How to spot this was a phishing email:


  1. Was this an email you expected to receive? No - Be cautious
  2. Confirm with IT or human resources.
  3. Always review sender email and determine if suspicious (example: it@192-168-1-30.com)
  4. The primary domain (192-168-1-30.com) is not associated with the company.
  5. This email was/may have been filtered and in your junk mail folder.


“An employee is either an asset to your cyber security or a risk.”