Your company is participating in a Cyber Security Education Program.


This Computer Usage Phishing Attack included the following social engineering techniques:


  1. Theme based on timing of year (ex: bonus during holidays)
  2. Congratulations subject with gift card
  3. Timing critical: redeem up to <date>
  4. From email name and subject: (ex: amazon)


How to spot this was a phishing email:


  1. Was this an email you expected to receive? No - Be cautious
  2. Confirm with management or human resources.
  3. Always review sender email and determine if suspicious (example: reply-amazon.com)
  4. The primary domain (reply-amazon.com) is not associated with amazon.
  5. This email was/may have been filtered and in your junk mail folder.


“An employee is either an asset to your cyber security or a risk.”