This was a phishing simulation

You clicked a link in a simulated phishing email from our security team. No harm was done, but the click was recorded to help improve awareness. This isn’t about blame—it’s a quick learning moment.

Report suspicious emails: use your mail client’s Report phishing option, or forward the message as an attachment to security@yourcompany.com.

Quick red flags to spot next time

  • Sender mismatch (name looks right, address doesn’t match our domain)

  • Odd links (misspellings, look-alike domains, URL shorteners)

  • Urgent pressure (“account disabled in 2 hours”)

  • Unexpected attachments or prompts to enable macros

  • Unusual requests (gift cards, credentials, bypassing approvals)

  • QR codes or repeated MFA prompts you didn’t initiate

Safer habits

  • Hover links and read the real domain before clicking

  • For sensitive actions, go directly to the site (type/bookmark), don’t use email links

  • Verify on a second channel (call/message the known number, not the one in the email)

What we record from this simulation: timestamp, campaign, topic, a randomized recipient ID, and your email—used only for training and awareness.

If you think you received a real phishing email, contact IT immediately: security@yourcompany.com.

You will receive an email to complete the required security awareness training.