Your company is participating in a Cyber Security Education Program.


This Disk Full Phishing Attack included the following social engineering techniques:


  1. Spoofed email and domain (example: <your-company>.co).
  2. Urgency to act.
  3. Use of your email to customize the email.
  4. Simple clean email to minimize suspicion.
  5. Link/Button to allow you take action attacker wants.
  6. Verbiage to catch attention (example: Limit Reached).


How to spot this was a phishing email:


  1. Was this an email you expected to receive? No - Be cautious
  2. Did this email come from someone from IT you know?
  3. You should reach out to IT if in doubt.
  4. The sender named email address was not associated with your company.
  5. Example: spoofing your company domain may have been used.
  6. The link provided used suspicious domain similar to above.


“An employee is either an asset to your cyber security or a risk.”