www.mail-center-alerts.com
Open in
urlscan Pro
3.105.203.239
Public Scan
Submitted URL: https://www.mail-center-alerts.com/7147043a688fd3df?l=30
Effective URL: https://www.mail-center-alerts.com/load_training?guid=87470435288fd3d1&correlation_id=534f8f57-5a49-467a-96a2-b4655da35dce
Submission: On January 16 via api from IE — Scanned from AU
Effective URL: https://www.mail-center-alerts.com/load_training?guid=87470435288fd3d1&correlation_id=534f8f57-5a49-467a-96a2-b4655da35dce
Submission: On January 16 via api from IE — Scanned from AU
Form analysis
1 forms found in the DOMPOST https://www.mail-center-alerts.com/training/acceptance?correlation_id=534f8f57-5a49-467a-96a2-b4655da35dce
<form action="https://www.mail-center-alerts.com/training/acceptance?correlation_id=534f8f57-5a49-467a-96a2-b4655da35dce" id="training-form" method="post"><button class="button" data-text="ack" type="submit">Acknowledge</button></form>
Text Content
YOU'VE BEEN PHISHED Don't close your browser and don't worry, this is an authorized simulation by JOHN HOLLAND GROUP PTY LTD and we're going to show you what phishing is, and how to stay "off the hook". At the bottom of this web page there is an "Acknowledge" button you need to click to show us that you have completed the training. HERE'S HOW PHISHING WORKS: * 1 First, the attacker picks users to target at various levels within the organization. Anyone from top executives and their staff, systems administrators, customer service representatives, HR, and accounting can be a target. Even you. * 2 Then the attacker sends you an email that attempts to get you to take an action such as clicking on a link, opening an attachment, or logging into a fake web site. * 3 When you click on the attacker's malicious link or open a malicious attachment, your computer is infected with malicious software called malware. * 4 The malware gives the attacker access into your computer where the attacker can read your email, access files on your hard drive and the network, and attack other users or systems on the network -- all from your computer! * 5 Once the attacker has gathered all of the data he or she needs, they zip it up, and upload it from your computer out to the Internet. Phishing is a very serious problem as attacks are increasing in frequency. However through on-going user training, we can equip you with the knowledge to spot phishing emails and stay "off the hook". ASK YOURSELF THE FOLLOWING QUESTIONS THE NEXT TIME YOU RECEIVE A SUSPICIOUS EMAIL: * Do you really know who is sending you the email? * Do you recognize the sender and their email address? * Is the tone consistent with what you would expect from the sender? * Is the sender asking you to open an attachment or access a website? * Is the sender threatening that you may lose access to your account? If you receive a suspicious email contact the information security department right away. By clicking “Acknowledge” below you agree that you have read the training material. Acknowledge This phishing simulation was provided by your employer and may contain logos from unaffiliated companies. Please only contact your employer regarding this message. Confidential and Proprietary - Privacy Policy