www.corp-internal.com
Open in
urlscan Pro
3.81.175.99
Public Scan
Submitted URL: https://www.corp-internal.com/54edc60887931cad?l=6
Effective URL: https://www.corp-internal.com/load_training?guid=6fedc60a67931c16&correlation_id=a8bffa1b-9a7a-489e-8f61-967b35139794
Submission: On October 25 via manual from US — Scanned from DE
Effective URL: https://www.corp-internal.com/load_training?guid=6fedc60a67931c16&correlation_id=a8bffa1b-9a7a-489e-8f61-967b35139794
Submission: On October 25 via manual from US — Scanned from DE
Form analysis
1 forms found in the DOMPOST https://www.corp-internal.com/training/acceptance?correlation_id=a8bffa1b-9a7a-489e-8f61-967b35139794
<form action="https://www.corp-internal.com/training/acceptance?correlation_id=a8bffa1b-9a7a-489e-8f61-967b35139794" id="training-form" method="POST"><button data-text="ack" name="training_ack" type="submit">Complete training<br>
<span>( Yes, I actually read everything )</span></button></form>
Text Content
PLEASE READ WELCOME TO SECURITY AWARENESS TRAINING! CHENMED IS PROVIDING YOU WITH THIS TRAINING TO HELP KEEP YOU AND OUR DATA SECURE. PHISHING 101 Phishing is a scam that attempts to lure you into giving up your personal or sensitive information by masquerading as someone you know and trust, like a coworker or vendor you commonly use. HOW DOES PHISHING WORK? First, the attacker picks users to target at various levels within the organization. Anyone from top executives and their staff, systems administrators, customer services representatives, HR, and accounting can be a target. Even you! Then the attacker sends you an email that attempts to get you to take an action such as clicking on a link, opening a malicious attachment, or logging into a fake web site. When you click on the attacker’s malicious link or open a malicious attachment, your computer is infected with malicious software called malware. The malware gives the attacker access into your computer where the attacker can read your email, access files on your hard drive and the network, and attack other users or systems on the network — all from your computer! Once the attackers have gathered up all of your stolen data they upload it from your computer and out to the Internet. WHO IS TARGETED? Phishers target every level of employee from executives to interns and pose a significant threat to our organization. You are our last line of defense against this threat. WHAT HAPPENS DURING A PHISHING ATTACK? If you click on a malicious link or open a malicious attachment, it could corrupt all the files on your machine, give the attackers access to our network and servers, and lead to reputational damage and significant money loss. Phishers know that they can manipulate people by stirring up their emotions. Common approaches are to play on fear, empathy, urgency, or even greed. HOW CAN I HELP STOP PHISHING? * Be suspicious of messages that have vague, generic, or impersonal messages. Does the email’s message “sound” feel authentic? * Be vigilant! Don’t blindly trust anything that comes into your in box. Be a “Smart Skeptic”. * If you receive a suspicious email, attach the message to a blank email and forward it to the security group or your helpdesk and then delete it. * Ensure that your computer is kept up to date with patches, updates, and anti-virus definitions. * If the email stirs a strong emotion such as fear, empathy, urgency, or anger, catch your self and think about the message carefully. * Never trust an email that asks you for personal or inside information such as your username or password. * Never click on links in emails until you confirm the sender is authentic * Check the "From:"" field closely, but know that the “From:” field can be spoofed * Phishing websites may look real, by using company logos, and domain names that might be close mis-spellings or lookalikes * Be suspicious of messages that have vague, generic, or impersonal messages. Does the email’s message “sound” feel authentic? * Be vigilant! Don’t blindly trust anything that comes into your in box. Be a “Smart Skeptic”. 1. 1 2. 2 3. 3 4. 4 5. 5 6. 6 7. 7 8. 8 9. 9 CLASS DISMISSED! While we have deployed a lot of security technology, you are the last line of defense. We need your help! If you ever get an email that doesn’t seem quite right, say something. Contact the help desk or the security department. Complete training ( Yes, I actually read everything ) This phishing simulation was provided by your employer to help teach you to recognize commonly-used phishing risks. To appear as realistic as possible, it may contain the name, brand or logo of unaffiliated third parties. Please do NOT contact the company that is named or whose brands or logos were used. If you have any questions or concerns about phishing emails, please contact only your own employer. Confidential and Proprietary - Privacy Policy