you have been phished!
This is a phishing exercise
Here are some best practices to follow:
- Scrutinize email sender addresses, subject lines, and content for suspicious elements like misspellings, urgent requests, or unexpected attachments.
- Hover over links before clicking to verify the actual URL destination and avoid clicking on shortened or suspicious links.
- Be cautious of emails requesting sensitive information or urgent action, especially those creating a sense of fear or urgency.
- Use multi-factor authentication for accounts to add an extra layer of security even if credentials are compromised.
- Report suspicious emails immediately using the organization’s designated reporting system, allowing IT teams to respond quickly to potential threats