10. Exercise Solution: Championing Security

Exercise Solution: Championing Security

ND545 C4 L2 06 Championing Security Exercise Solution Video

Sample E-mail Example

To all company associates:

Phishing campaigns remain one of the most highly used techniques by bad actors seeking to gain unauthorized access to our organization and its assets. As a reminder, phishing attempts occur when a bad actor sends email messages attempting to trick users into clicking on a malicious hyperlink or provide personal information like corporate credentials in a web form. More often than not, these emails are made to appear as if they are coming from well-known organizations, companies our organization works with, or from colleagues.

It is important to scrutinize every email. Often phishing emails have spelling mistakes, look slightly different in appearance, or originate come from unexpected domains but sometimes phishing emails look perfectly harmless. So, you should also scrutinize what the email is asking you to do. Does it seem out-of-the-ordinary? Is it something that you wouldn't ordinarily do outside of work (e.g. send money to someone unexpectedly)? If you receive a phishing email or just aren't sure please contact the information security department at InfoSec@domain.com.

Thank you,

Company Governance Professional

Compare

QUESTION:

How did your e-mail compare to the one above? How is it different?

ANSWER:

Remember, your e-mail should have included at least these following points:

  • Define phishing
  • Describe examples of phishing, what do they look like?
  • Why is it important?
  • What should you do if you suspect a phishing e-mail in your inbox?