Suspicious emails correct answers

Nice!
You have successfully completed the training


Experience Points

Correct Answers:

IRS Email
Check the senders email domain
IRS Email
Not Legitimate: Call the IRS to get federal tax assistance
Microsoft Email
Legitimate email
Amazon email: Investigate
Email sender contain numbers. Suspicious!
Amazon email: Action
Delete Email
Google doc email: Investigate
Hover over email url
Google doc email: Action
Suspicious URL
Amex email
Induce a feeling of urgency and suspicious URL

Ransomware

Similar to malware, ransomware is used by attackers to extort money from the target individual or organization.

Phishing

Designed user to click on dangerous links — possibly divulging personal information, even financial information.

Spam

Cyber criminals can even embed password-stealing malware from a simple LinkedIn invitation.

Training

Our advance programs simulate most highlighted real world threat events. Improve your memory recall.

Why Security Awareness Training is Important to all organizations ?

Research suggests that most companies have unprotected data and poor cybersecurity practices in place, making them vulnerable to data-loss, data breaches, ransomware and more.