microsoft.micrasoft-onedrive.com Open in urlscan Pro
52.210.95.36  Public Scan

Submitted URL: https://microsoft.micrasoft-onedrive.com/f334b8e64597c02e?l=51
Effective URL: https://microsoft.micrasoft-onedrive.com/load_training?guid=b734b8e92597c0d8&correlation_id=dc83add8-a935-4a60-bc2f-0adc8214f0ae
Submission: On October 23 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST https://microsoft.micrasoft-onedrive.com/training/acceptance?correlation_id=dc83add8-a935-4a60-bc2f-0adc8214f0ae

<form action="https://microsoft.micrasoft-onedrive.com/training/acceptance?correlation_id=dc83add8-a935-4a60-bc2f-0adc8214f0ae" method="post" id="training-form"><button class="button" data-text="ack" type="submit" dir="ltr">Acknowledge</button>
</form>

Text Content

English - US
 * Arabic
 * Chinese - Simpl
 * Danish
 * Dutch
 * Finnish
 * French - FR
 * German
 * Greek
 * Hindi
 * Italian
 * Japanese
 * Korean
 * Romanian
 * Spanish - LatAm


YOU'VE BEENPHISHED

Don't close your browser and don't worry, this is an authorized simulation by
CROWN and we're going to show you what phishing is, and how to stay "off the
hook".

At the bottom of this web page there is an "Acknowledge" button you need to
click to show us that you have completed the training.


HERE'S HOW PHISHING WORKS:

 * 1
   
   First, the attacker picks users to target at various levels within the
   organization. Anyone from top executives and their staff, systems
   administrators, customer service representatives, HR, and accounting can be a
   target. Even you.

 * 2
   
   Then the attacker sends you an email that attempts to get you to take an
   action such as clicking on a link, opening an attachment, or logging into a
   fake web site.

 * 3
   
   When you click on the attacker's malicious link or open a malicious
   attachment, your computer is infected with malicious software called malware.

 * 4
   
   The malware gives the attacker access into your computer where the attacker
   can read your email, access files on your hard drive and the network, and
   attack other users or systems on the network -- all from your computer!.

 * 5
   
   Once the attacker has gathered all of the data he or she needs, they zip it
   up, and upload it from your computer out to the Internet.

Phishing is a very serious problem as attacks are increasing in frequency.

However through on-going user training, we can equip you with the knowledge to
spot phishing emails and stay 'off the hook'.




ASK YOURSELF THE FOLLOWING QUESTIONS THE NEXT TIME YOU RECEIVE A SUSPICIOUS
EMAIL:

 * Do you really know who is sending you the email?
 * Do you recognize the sender and their email address?
 * Is the tone consistent with what you would expect from the sender?
 * Is the sender asking you to open an attachment or access a website?
 * Is the sender threatening that you may lose access to your account?

If you receive a suspicious email contact the information security department
right away.

By clicking “Acknowledge” below you agree that you have read the training
material.

Acknowledge

This phishing simulation was provided by your employer to help teach you to
recognize commonly-used phishing risks. To appear as realistic as possible, it
may contain the name, brand or logo of unaffiliated third parties. Please do NOT
contact the company that is named or whose brands or logos were used. If you
have any questions or concerns about phishing emails, please contact only your
own employer. Confidential and Proprietary - Privacy Policy