Your company is participating in a Cyber Security Education Program.
This Impersonation Phishing Attack included the following social engineering techniques:
- Use of your name to personalize the message.
- A time limit to create a sense of urgency.
- Link inserted to make it easy to engage.
- Simple request from authority figure to encourage interaction.
How to spot this was a phishing email:
- Was this an email you expected to receive? No - Be cautious
- Beware of links inserted in emails.
- The sender email address does not match the official email of the impersonated sender.
- The link provided used suspicious/spoofed domain similar to above (example: locked-outlook.com).
