www.mail-center-alerts.com Open in urlscan Pro
3.105.203.239  Public Scan

Submitted URL: https://www.mail-center-alerts.com/7147043a688fd3df?l=30
Effective URL: https://www.mail-center-alerts.com/load_training?guid=87470435288fd3d1&correlation_id=534f8f57-5a49-467a-96a2-b4655da35dce
Submission: On January 16 via api from IE — Scanned from AU

Form analysis 1 forms found in the DOM

POST https://www.mail-center-alerts.com/training/acceptance?correlation_id=534f8f57-5a49-467a-96a2-b4655da35dce

<form action="https://www.mail-center-alerts.com/training/acceptance?correlation_id=534f8f57-5a49-467a-96a2-b4655da35dce" id="training-form" method="post"><button class="button" data-text="ack" type="submit">Acknowledge</button></form>

Text Content

                   YOU'VE BEEN PHISHED

Don't close your browser and don't worry, this is an authorized simulation by
JOHN HOLLAND GROUP PTY LTD and we're going to show you what phishing is, and how
to stay "off the hook".

At the bottom of this web page there is an "Acknowledge" button you need to
click to show us that you have completed the training.


HERE'S HOW PHISHING WORKS:

 * 1
   
   First, the attacker picks users to target at various levels within the
   organization. Anyone from top executives and their staff, systems
   administrators, customer service representatives, HR, and accounting can be a
   target. Even you.

 * 2
   
   Then the attacker sends you an email that attempts to get you to take an
   action such as clicking on a link, opening an attachment, or logging into a
   fake web site.

 * 3
   
   When you click on the attacker's malicious link or open a malicious
   attachment, your computer is infected with malicious software called malware.

 * 4
   
   The malware gives the attacker access into your computer where the attacker
   can read your email, access files on your hard drive and the network, and
   attack other users or systems on the network -- all from your computer!

 * 5
   
   Once the attacker has gathered all of the data he or she needs, they zip it
   up, and upload it from your computer out to the Internet.

Phishing is a very serious problem as attacks are increasing in frequency.

However through on-going user training, we can equip you with the knowledge to
spot phishing emails and stay "off the hook".




ASK YOURSELF THE FOLLOWING QUESTIONS THE NEXT TIME YOU RECEIVE A SUSPICIOUS
EMAIL:

 * Do you really know who is sending you the email?
 * Do you recognize the sender and their email address?
 * Is the tone consistent with what you would expect from the sender?
 * Is the sender asking you to open an attachment or access a website?
 * Is the sender threatening that you may lose access to your account?

If you receive a suspicious email contact the information security department
right away.

By clicking “Acknowledge” below you agree that you have read the training
material.

Acknowledge

This phishing simulation was provided by your employer and may contain logos
from unaffiliated companies. Please only contact your employer regarding this
message. Confidential and Proprietary - Privacy Policy