Your company is participating in a Cyber Security Education Program.


This Electronic Invite Phishing Attack included the following social engineering techniques:


  1. Topical/Timely subject: (example) Summer BBQ.
  2. Use of a "lure email" to lower your guard when receiving the actual phishing email which may be filtered into "junk mail".
  3. Use of a greeting card logo to look authentic.
  4. Spoofed domain to appear it comes official domain (example: invite.lang-fr-en.ca).


How to spot this was a phishing email:


  1. Was this an email you expected to receive? No - Be cautious
  2. Did your company indicate this event was going to occur?
  3. The sender named email address was not coming from greeting company (example: invite@lang-fr-en.com).
  4. The primary domain was not correct for greeting card company (example: official domain www.hallmark.com).
  5. The actual phishing email was potentially filtered by junk mail to help indicate it may be un-invited.


“An employee is either an asset to your cyber security or a risk.”