You have been redirected to this educational page because you clicked on a suspicious link. In a real phishing attack, your personal information, passwords, or financial data could have been compromised.
What just happened?
The link you clicked was designed to look legitimate, but it was actually a simulated phishing attempt. This demonstrates how easy it is to fall victim to these attacks.
The Good News
This was only a test to help you learn. No actual harm was done, and your information is safe. Let's use this as a learning opportunity.
Quick Identification Checklist
Sender
Is the domain really from your company/partner? (Check letters and suffix carefully)
Recipients
BCC to multiple people? Irrelevant to your role?
Tone
Urgent/Threatening/Coercive/High rewards?
Links
Hover to preview - does it point to an unfamiliar domain?
Attachments
Does it require "Enable Macros/Content/Editing"?
Information Request
Asking for passwords/verification codes/bank cards/ID photos?
Payment Changes
Vendor account changes, urgent payment requests?
QR Codes
Is the source trustworthy? Does the landing page require login?
Spelling & Format
Mixed languages, typos, abnormal formatting?
Unauthorized Requests
Manager asking for private transfers/data, bypassing procedures?
💡 Tip: If any of the above seems suspicious, do not click links or download attachments. Contact your IT security team immediately for verification.
High-Risk Scenarios at Work
Be extra vigilant in these common workplace situations
Finance & Procurement
- Payment account changes
- Urgent payment requests
- Contract attachments
HR & Legal
- Payroll statements
- Recruitment resumes
- Compliance investigations
R&D & Operations
- Fake code reviews
- Repository invitations
- VPN/email password resets
Travel & Meetings
- Public Wi-Fi QR codes
- Meeting material downloads
- USB drive gifts
Best Practices
Three core principles to protect yourself from phishing attacks
Check Domain, Don't Rush, Verify Twice Before Acting
Always verify the sender's domain carefully. Take your time to examine suspicious emails. When in doubt, verify through a second channel before taking any action.
Any Request for Passwords/Codes/Transfers is a Red Line
Legitimate organizations will never ask for passwords, verification codes, or direct transfers via email. This is an absolute red line - no exceptions.
Type Official URLs Manually, Don't Click Email Links
Always navigate to official websites by typing the URL directly into your browser. Never click links provided in emails, even if they look legitimate.
Test Your Knowledge
Can you identify these phishing scenarios?
Progress: 0/8