www.corp-internal.com Open in urlscan Pro
3.81.175.99  Public Scan

Submitted URL: https://www.corp-internal.com/54edc60887931cad?l=6
Effective URL: https://www.corp-internal.com/load_training?guid=6fedc60a67931c16&correlation_id=a8bffa1b-9a7a-489e-8f61-967b35139794
Submission: On October 25 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST https://www.corp-internal.com/training/acceptance?correlation_id=a8bffa1b-9a7a-489e-8f61-967b35139794

<form action="https://www.corp-internal.com/training/acceptance?correlation_id=a8bffa1b-9a7a-489e-8f61-967b35139794" id="training-form" method="POST"><button data-text="ack" name="training_ack" type="submit">Complete training<br>
    <span>( Yes, I actually read everything )</span></button></form>

Text Content

PLEASE READ



WELCOME TO SECURITY AWARENESS TRAINING!
CHENMED IS PROVIDING YOU WITH THIS TRAINING TO HELP KEEP YOU AND OUR DATA
SECURE.


PHISHING 101



 
 
 




Phishing is a scam that attempts to lure you into giving up your personal or
sensitive information by masquerading as someone you know and trust, like a
coworker or vendor you commonly use.


HOW DOES PHISHING WORK?

First, the attacker picks users to target at various levels within the
organization.  Anyone from top executives and their staff, systems
administrators, customer services representatives, HR, and accounting can be a
target. Even you!

Then the attacker sends you an email that attempts to get you to take an action
such as clicking on a link, opening a malicious attachment, or logging into a
fake web site.

When you click on the attacker’s malicious link or open a malicious attachment,
your computer is infected with malicious software called malware.

The malware gives the attacker access into your computer where the attacker can
read your email, access files on your hard drive and the network, and attack
other users or systems on the network — all from your computer!

Once the attackers have gathered up all of your stolen data they upload it from
your computer and out to the Internet.


WHO IS TARGETED?

Phishers target every level of employee from executives to interns and pose a
significant threat to our organization. You are our last line of defense against
this threat.




WHAT HAPPENS DURING A PHISHING ATTACK?

If you click on a malicious link or open a malicious attachment, it could
corrupt all the files on your machine, give the attackers access to our network
and servers, and lead to reputational damage and significant money loss.

Phishers know that they can manipulate people by stirring up their emotions.
Common approaches are to play on fear, empathy, urgency, or even greed.




HOW CAN I HELP STOP PHISHING?

 
 * Be suspicious of messages that have vague, generic, or impersonal messages.
   Does the email’s message “sound” feel authentic?
 * Be vigilant!
   Don’t blindly trust anything that comes into your in box. Be a “Smart
   Skeptic”.
 * If you receive a suspicious email, attach the message to a blank email and
   forward it to the security group or your helpdesk and then delete it.
 * Ensure that your computer is kept up to date with patches, updates, and
   anti-virus definitions.
 * If the email stirs a strong emotion such as fear, empathy, urgency, or anger,
   catch your self and think about the message carefully.
 * Never trust an email that asks you for personal or inside information such as
   your username or password.
 * Never click on links in emails until you confirm the sender is authentic
 * Check the "From:"" field closely, but know that the “From:” field can be
   spoofed
 * Phishing websites may look real, by using company logos, and domain names
   that might be close mis-spellings or lookalikes
 * Be suspicious of messages that have vague, generic, or impersonal messages.
   Does the email’s message “sound” feel authentic?
 * Be vigilant!
   Don’t blindly trust anything that comes into your in box. Be a “Smart
   Skeptic”.

 1. 1
 2. 2
 3. 3
 4. 4
 5. 5
 6. 6
 7. 7
 8. 8
 9. 9


CLASS DISMISSED!

While we have deployed a lot of security technology, you are the last line of
defense. We need your help!

If you ever get an email that doesn’t seem quite right, say something. Contact
the help desk or the security department.

Complete training
( Yes, I actually read everything )

This phishing simulation was provided by your employer to help teach you to
recognize commonly-used phishing risks. To appear as realistic as possible, it
may contain the name, brand or logo of unaffiliated third parties. Please do NOT
contact the company that is named or whose brands or logos were used. If you
have any questions or concerns about phishing emails, please contact only your
own employer. Confidential and Proprietary - Privacy Policy