Your company is participating in a Cyber Security Education Program.


This Zoom (or alternate video conferencing application) Phishing Attack included the following social engineering techniques:


  1. Technical content about security to intimidate.
  2. Sense of urgency to act so you could continue using Zoom/App.
  3. Corporate Zoom/App logo to appear legitimate.
  4. Multiple languages to appear official.
  5. Links and sender names masked with Zoom/App to appear correct.


How to spot this was a phishing email:


  1. Did this email ask you to do something urgently? - Yes - this is a typical tactic
  2. The sender named "Zoom Support" (or App specific) email address was suspicious (do-not-reply@security-information.xyz)
  3. The Email Verification button link was zoom.lang-en.ca (or App specific)
  4. The security bulletin link was also zoom.lang-en.ca (or App specific)


Note: Zoom domain is zoom.us so emails (me@zoom.us) and pages (zoom.us/home) would be expected to use this domain.


“An employee is either an asset to your cyber security or a risk.”