scb.securitytraining.io Open in urlscan Pro
34.197.1.197  Public Scan

Submitted URL: https://clicktime.symantec.com/15tpDLwAR2BQ3Ai5Y6jWE?h=Aaj37QYpp-Lhd25O8lcGp3zUYKXJgXXtyph7LI5d_Hs=&u=http://www.mail-subsystem...
Effective URL: https://scb.securitytraining.io/training?a=iY7i47e_jRA&t=PlBbbhLtEBpCW0ZSSWE1z3mVa1Q
Submission: On December 19 via manual from IN — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

You've clicked on a link in a phishing simulation email 



Luckily, this was only a simulated attack. Had this been a real phishing email,
by clicking on the link, your device or the Bank's network could have been
infected with malware, leading to our information being stolen or systems being
disrupted, and potentially causing reputational damage and financial losses.

Every single one of us is responsible for helping to tackle the phishing threat.
Spotting and reporting suspicious emails doesn’t just protect you…it protects
our clients, your fellow colleagues and helps us build a strong risk culture (as
applied to ICS) across the Bank.



Additional support in identifying suspicious emails 

There were a number of red flags to indicate that the email was phishing. Below,
highlighted in red, are the key indicators:




 1. External source notification within the subject title and red external email
    banner
 2. The email is sent from a suspicious and unknown domain
 3. Use of threatening language
 4. The hyperlinked text leads to an unfamiliar URL



Whenever you are in doubt remember:





Standard Chartered Bank | People Security | ICS