Your company is participating in a Cyber Security Education Program.


This Impersonation Phishing Attack included the following social engineering techniques:


  1. Use of your name to personalize the message.
  2. A time limit to create a sense of urgency.
  3. Link inserted to make it easy to engage.
  4. Simple request from authority figure to encourage interaction.


How to spot this was a phishing email:


  1. Was this an email you expected to receive? No - Be cautious
  2. Beware of links inserted in emails.
  3. The sender email address does not match the official email of the impersonated sender.
  4. The link provided used suspicious/spoofed domain similar to above (example: locked-outlook.com).


“An employee is either an asset to your cyber security or a risk.”