top of page

OOPS!

You fell for a phishing link.                              Others that fell for it:

​

Dear collegue,
 

As part of our internal training, we recently conducted a phishing simulation to assess our vulnerability to phishing attacks. This exercise is crucial in helping us understand the risks associated with phishing and how we can protect ourselves and the company.
 

Why does this matter?

Phishing attacks can lead to severe consequences, including identity theft, data breaches, malware installation, and operational disruption. These threats can compromise our personal information, the company’s sensitive data, and disrupt our business operations.
 

What can you do to protect yourself?
 

  1. Verify the Sender: Never open links or documents from an email you do not recognize, especially from new or unfamiliar senders. Always double-check the sender’s email address for any signs of spoofing.

  2. Hover Over Links: Before clicking on any link, hover your mouse over it to view the underlying web address. This helps you verify if the link leads to a legitimate website.

  3. Report Suspicious Emails: If you receive an email that seems suspicious or unusual, report it immediately to a colleague or the IT department. Do not click any links or download attachments until it has been verified.

     

We hope this experience has been informative and will help prevent future phishing attacks. Staying vigilant and informed is key to protecting ourselves and our company from potential threats.
 

Kind regards,
Raf

bottom of page