court.notifierservice.com Open in urlscan Pro
52.228.106.140  Public Scan

URL: https://court.notifierservice.com/x/7LVZk6XFzzn1k
Submission: On September 07 via manual from US — Scanned from CA

Form analysis 0 forms found in the DOM

Text Content


 


THIS WAS AN AUTHORIZED PHISHING SIMULATION

YOU ARRIVED AT THIS PAGE AFTER CLICKING ON A LINK IN A SIMULATED PHISHING
E-MAIL.

This phishing e-mail was sent as part of your cybersecurity awareness training.
Don't worry, you won't be punished for clicking on this simulation. However,
please take a moment to learn more about how to protect yourself from phishing.


WHAT'S PHISHING

Phishing is a form of social engineering that uses e-mail and deception to trick
victims into clicking links, opening files or providing important organizational
information unintentionally.

Phishing is often the opening move in sophisticated cyber attacks against
individuals and organizations.


HOW TO SPOT A PHISH

There are two main types of phishing e-mails - generic campaigns and ones that
are targeted at specific organizations or individuals, known as spear phishing

Generic phishing campaigns include ones that look like they came from your bank
(or another financial institution), online services such as PayPal, eBay or
Apple iTunes Store or Amazon and they may look like parcel shipment information
from FedEx, UPS, USPS, Canada Post and others.

Targeted phishing or spear phishing campaigns may contain information about you
or your organization or may look like a legitimate message from within your
organization.


WARNING SIGNS FOR FUTURE PHISHING ATTACKS

 * E-mail states you will lose access to your account(s) if you don't take
   immediate action.
 * Links in the e-mail go to unusual websites that don't match the service or
   organization the e-mail says it is from. You can check these safely in most
   e-mail programs by hovering over any links.
 * The e-mail has an attachment referring to an invoice, budget or salary
   information that you were not previously expecting from a trusted sender. The
   attachments may be in the form of a Word or Excel spreadsheet and may ask you
   to enable macros. Don't.
 * The e-mail address in the reply field does not match with the from/sender
   information. You can often check this by clicking on the reply address in
   your e-mail client. You can check this by examining the header information in
   an e-mail.
 * The e-mail may contain spelling or grammatical errors. Increasingly though
   cybercriminals are taking the time to avoid these easy to spot mistakes.

 

IGMCyberAware@ig.ca