This was a phishing simulation
You clicked a link in a simulated phishing email from our security team. No harm was done, but the click was recorded to help improve awareness. This isn’t about blame—it’s a quick learning moment.
Report suspicious emails: use your mail client’s Report phishing option, or forward the message as an attachment to security@yourcompany.com.
Quick red flags to spot next time
Sender mismatch (name looks right, address doesn’t match our domain)
Odd links (misspellings, look-alike domains, URL shorteners)
Urgent pressure (“account disabled in 2 hours”)
Unexpected attachments or prompts to enable macros
Unusual requests (gift cards, credentials, bypassing approvals)
QR codes or repeated MFA prompts you didn’t initiate
Safer habits
Hover links and read the real domain before clicking
For sensitive actions, go directly to the site (type/bookmark), don’t use email links
Verify on a second channel (call/message the known number, not the one in the email)
What we record from this simulation: timestamp, campaign, topic, a randomized recipient ID, and your email—used only for training and awareness.
If you think you received a real phishing email, contact IT immediately: security@yourcompany.com.
You will receive an email to complete the required security awareness training.