Brand Imitations in a mobile ready format
 

Legitimate organizations will not solicit your password or other personal information. If you receive an unsolicited request for your login credentials or sensitive information, it may be a trap.

You can get phished almost anywhere. Look out for scams sent via:

Phone Text Messages Social Media

Spear phishers use trademarked logos and other images illegally. Look out for logos that are outdated, distorted, or stretched.

camera flash

Spear phishers will copy entire emails and landing pages so they match the real thing. Look for typos or other contextual clues that something isn’t right.

Spear phishers send emails from spoofed domains or copycat domains. Double check sender addresses and link destinations. Avoid clicking shortened links if you don’t know where they lead.

You are the last line of defense against phishing. If something seems suspicious, report it immediately.

This has been an authorized phishing simulation set up by your employer. Please take the time to learn how you can prevent future attacks.

warning image  Infographic contains sound effects