Phishing
Game

It might take a very sharp eye to spot a phishing attempt. To keep your
information safe, it’s good to practice identifying phishing every once in
a while. Can you spot the fake emails from the real ones?

You’ve received a request from your supplier abroad.

Their emails usually come from “accounts@suppliesinc.com”.

You’ve received a request to update billing information from
your supplier abroad.

Their emails usually come from “david.king@globalcorp.com”.

You’ve received an enquiry about outstanding or due payments
from your supplier.

Their emails usually come from “mariana.torres@systemsinternational.com”.

Your HR department has sent you an email.

Their emails usually come from “laura.watson@company.com”.

You’ve received a request to sign a document.

Your HR department has sent you an email.

Their emails usually come from “helpdesk@company.com”.

You’ve received an email in regards of a CloudDrive account

You have never received emails from this source before.

You got a notification on unrecognized sign-in.

Their emails usually come from “no-reply@company.com”.

You’ve received a notice of space running out on your email account

Emails from your IT Department usually come from “IT@company.com”.

You’ve received a Security Alert notification

You’ve received an email from an italian stainless steel
supplier you met last week at a Trade Fair.

The email address in the business card he gave you is “roberto.rossi@stainless-steel-italy.com”.

You’ve received a notification regarding your email account.

Great Job!

You got /12 correct.

You really have a sharp eye on phishing! Keep it up!

Did you know, that 85% of all data breaches involve human interaction?*
It’s a lot easier to trick a human than it is to breach a security system.
That’s why user vigilance is a major factor in keeping your company safe.

*Verizon’s Data Breach Investigations report

Halfway
there!

You got /12 correct.

The clues that give away phishing can be subtle. Take your time in assessing
the message and no phishing can get past you.

Did you know, that 85% of all data breaches involve human interaction?*
It’s a lot easier to trick a human than it is to breach a security system.
That’s why user vigilance is a major factor in keeping your company safe.

*Verizon’s Data Breach Investigations report

Keep a
sharp eye!

You got /12 correct.

The clues that give away phishing can be subtle. Take your time in assessing
the message and no phishing can get past you.

Did you know, that 85% of all data breaches involve human interaction?*
It’s a lot easier to trick a human than it is to breach a security system.
That’s why user vigilance is a major factor in keeping your company safe.

*Verizon’s Data Breach Investigations report