www.emailsecuritymonitor.com Open in urlscan Pro
52.228.106.140  Public Scan

URL: https://www.emailsecuritymonitor.com/x/QDeWVPoHl3Yyl
Submission: On April 03 via manual from SG — Scanned from CA

Form analysis 0 forms found in the DOM

Text Content

 


 


THIS WAS AN AUTHORIZED PHISHING SIMULATION

YOU ARRIVED AT THIS PAGE AFTER CLICKING ON A LINK IN A SIMULATED PHISHING
E-MAIL.

This phishing e-mail was sent as part of your cybersecurity awareness training.
Don't worry, you won't be punished for clicking on this simulation. However,
please take a moment to learn more about how to protect yourself from phishing.


WHAT'S PHISHING

Phishing is a form of social engineering that uses e-mail and deception to trick
victims into clicking links, opening files or providing important organizational
information unintentionally.

Phishing is often the opening move in sophisticated cyber attacks against
individuals and organizations.


HOW TO SPOT A PHISH

There are two main types of phishing e-mails - generic campaigns and ones that
are targeted at specific organizations or individuals, known as spear phishing

Generic phishing campaigns include ones that look like they came from your bank
(or another financial institution), online services such as PayPal, eBay or
Apple iTunes Store or Amazon and they may look like parcel shipment information
from FedEx, UPS, USPS, Canada Post and others.

Targeted phishing or spear phishing campaigns may contain information about you
or your organization or may look like a legitimate message from within your
organization.


WARNING SIGNS FOR FUTURE PHISHING ATTACKS

 * E-mail states you will lose access to your account(s) if you don't take
   immediate action.
 * Links in the e-mail go to unusual websites that don't match the service or
   organization the e-mail says it is from. You can check these safely in most
   e-mail programs by hovering over any links.
 * The e-mail has an attachment referring to an invoice, budget or salary
   information that you were not previously expecting from a trusted sender. The
   attachments may be in the form of a Word or Excel spreadsheet and may ask you
   to enable macros. Don't.
 * The e-mail address in the reply field does not match with the from/sender
   information. You can often check this by clicking on the reply address in
   your e-mail client. You can check this by examining the header information in
   an e-mail.
 * The e-mail may contain spelling or grammatical errors. Increasingly though
   cybercriminals are taking the time to avoid these easy to spot mistakes.


INVESTIGATING A SUSPICIOUS E-MAIL

 * Microsoft Outlook for Windows: Double-click the message to open it in a new
   window. Select the File tab, and then, at the bottom, click Properties. The
   data is next to Internet headers.
 * Outlook Web App (OWA): Double-click the message to open it. Click the options
   icon (three dots near the top right), and then click View Message Details.
 * Outlook Express, Windows Mail, or Windows Live Mail (Windows): In the message
   index, right-click the message, and then select Properties. Click the Details
   tab.
 * Outlook for Mac OS X: In your Inbox (or other folder), right-click or
   control-click the message, and then select View Source.
 * Thunderbird (Windows, Mac OS X): Click View, select Headers, and then choose
   All.
 * Mail (Mac OS X): With the message selected, from the View menu, select
   Message, and then select either All Headers or Long Headers
 * Gmail: Open the email you want to check the headers for. Next to Reply, click
   the Down arrow. Click Show original.

The use of any third party logos or trademarks is for educational and
illustrative purposes only.
CIRA does not have any relationship with the copyright holder or mark holder nor
do any CIRA customers.