s.applerts.net
Open in
urlscan Pro
54.83.101.48
Public Scan
URL:
http://s.applerts.net/s/oz977d8i9a4dru5/dl=0/7abdb4/151f311d-3584-4df4-8043-eba76cdde8d4/
Submission: On June 27 via manual from US — Scanned from DE
Submission: On June 27 via manual from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Skip to Main Content English English US * English English US No results found THIS WAS A TRINITY HEALTH PHISHING EXERCISE. USE THE OUTLOOK “REPORT PHISHING” BUTTON TO SEND SUSPICIOUS MESSAGES DIRECTLY TO THE SECURITY TEAM. WHEN IN DOUBT, CLICK THE TROUT! (Top right side of your toolbar in Outlook Desktop) WARNING SIGNS OF A PHISH Had this been a real malicious phish and not a simulation, our patients’ confidential data and Trinity Health information systems could have been compromised. Think twice before clicking hyperlinks, downloading attachments, or submitting your user credentials when solicited via email. Look for the Trinity Health External Warning Banner! -------------------------------------------------------------------------------- Hover over the highlighted words to reveal the warning signs of a phish. Instructions for customizing the email mockup: The email mockup below contains three areas highlighted in yellow. These highlighted areas are "clues" that indicate the email is a potential phish. When recipients who view this education hover over or tap a clue, they will see descriptive text that explains the clue in more detail. You can customize the email mockup so that its contents, clues, and clue descriptions match the email you are sending as part of your scenario. To customize the email mockup: 1. Save any changes you have made so far to the education. 2. In the email mockup below, change the From address, the subject line, and the email body to match the contents of this scenario's email. You can copy the subject line and email body from the Email tab. (For best results, type the From address manually.) 3. In the email body, click and drag the portion that you want to define as a clue (for example, the From email address, the subject line, or a specific phrase in the email body). Then, from the Styles list in the editor, select Marker: Yellow to highlight the clue in yellow. 4. In the "Type the text for your clue descriptions below" box beneath the email, type the clue description. 5. Repeat these steps for each clue you want to highlight. (NOTE: The editor matches clues with clue descriptions in the order they appear in the mockup regardless of the order in which you defined the clues. That is, the first clue description you provided is matched with the first clue that appears in the mockup, the second clue description is matched with the second clue in the mockup, and so on.) 6. Save your changes, preview the education, and send yourself a test message to make sure the education looks and functions as intended. * File * * Message * * Help * F From: Tammy Williamson <tammy.williamson@applerts.net> Subject: [External] You're invited to share this calendar CYBERSECURITY WARNING: This email is sent from outside of Trinity Health. DO NOT click on links, open attachments or share confidential information unless you know the sender and the email was expected. Please report any suspicious emails using the "Report Phishing" button. I'd like to share my calendar with you (Dear RECIPIENT_EMAIL_ADDRESS) , An Outlook Calendar Has Been Shared with you. You'll be able to see event titles, times, and locations. View calendar Type the text for your clue descriptions below. 1. Do you recognize this sender? 2. Always be careful when reviewing messages from external sources. 3. Were you expecting this email? 4. Always be careful when reviewing messages from external sources. 5. Bad actors often personalize messages to trick you. 6. Don't click on links unless you can verify the email is legitimate. 7. Notice the lack of a signature or contact information you could use to verify the validity of the email? If you suspect that you have received a phishing email at work, use the "Report Phishing" button on the Outlook Toolbar. * CONTACT YOUR LOCAL REGIONAL SECURITY OFFICE (RSO) FOR ASSISTANCE. * FOR QUESTIONS ABOUT THE PROGRAM, CONTACT HQTHSECURITYAWARENESS@TRINITY-HEALTH.ORG. LEARN MORE Many of the largest data breaches in recent years have impacted consumer services such as email providers, online shopping, dating websites, and banking services. These services may have access to your name, address, telephone numbers, credit card numbers, and more. To pre-emptively limit the impact of a data breach, be careful who you give your information to. We recommend that you: * Avoid free, unsecured wireless networks at coffee shops, airports, etc. * If you need to connect to our network remotely, use a Virtual Private Network (VPN) * Leave optional form fields blank * Consider using a different email address for online shopping, banking, etc. * Enable privacy settings on social accounts * Enable multi-factor authentication where available In addition to the steps listed above, you can enable credit fraud alerts and monitor your finances so that you are alerted whenever there is suspicious activity on your account. ©Cofense Phishing Education: Warning Signs of a Phish