Your company is participating in a Cyber Security Education Program.
This Computer Usage Phishing Attack included the following social engineering techniques:
- IT originated email: (subject: "Computer usage policy.")
- Timing critical (ex: Violations may result in disciplinary action ...)
- From email name used as subject to mask fictious email address ("Head Office")
How to spot this was a phishing email:
- Was this an email you expected to receive? No - Be cautious
- Confirm with IT or human resources.
- Always review sender email and determine if suspicious (example: it@192-168-1-30.com)
- The primary domain (192-168-1-30.com) is not associated with the company.
- This email was/may have been filtered and in your junk mail folder.