Your company is participating in a Cyber Security Education Program.
This Incident Phishing Attack included the following social engineering techniques:
- Email name includes product associated with email (example: reset-outlook.com)
- Email name includes authoritative verbiage (incident@...)
- Subject to appear critical or official (example: Please change your password!)
- Urgent email / consequence for no action (example: ... prevent damage ...)
- Limited and simple content to minimize detection by email filters.
How to spot this was a phishing email:
- From email address is some random domain not associated with your company or any software product used (example: @reset-outlook.com is not associated with Microsoft)
- The link provided references a domain not associated with official company (example: reset-outlook.com); official being something like "microsoft.com or outlook.office.com"
- This email was/may have been filtered and in your junk mail folder.