Your company is participating in a Cyber Security Education Program.


This Incident Phishing Attack included the following social engineering techniques:


  1. Email name includes product associated with email (example: reset-outlook.com)
  2. Email name includes authoritative verbiage (incident@...)
  3. Subject to appear critical or official (example: Please change your password!)
  4. Urgent email / consequence for no action (example: ... prevent damage ...)
  5. Limited and simple content to minimize detection by email filters.


How to spot this was a phishing email:



  1. From email address is some random domain not associated with your company or any software product used (example: @reset-outlook.com is not associated with Microsoft)
  2. The link provided references a domain not associated with official company (example: reset-outlook.com); official being something like "microsoft.com or outlook.office.com"
  3. This email was/may have been filtered and in your junk mail folder.


“An employee is either an asset to your cyber security or a risk.”