Your company is participating in a Cyber Security Education Program.


This Direct Deposit Phishing Attack included the following social engineering techniques:


  1. Use of your name to personalize the message.
  2. A time limit before account information change to create a sense of urgency.
  3. Link inserted to make it easy to engage.
  4. Simple and generic 2 sentence email combined with lack of sender information to evoke curiosity to click the link.


How to spot this was a phishing email:


  1. Was this an email you expected to receive? No - Be cautious
  2. Most financial institutions and services will not send links via email or SMS. They will request you to log in to their app or website.
  3. The sender email address was generic (example: do_not_reply@lang-fr-en.com)
  4. The link provided used suspicious/spoofed domain similar to above (example: lang-fr-en.com).


“An employee is either an asset to your cyber security or a risk.”