attach.business-services.org Open in urlscan Pro
44.193.95.232  Public Scan

Submitted URL: https://attach.business-services.org/517c186c0ac8a378?l=32
Effective URL: https://attach.business-services.org/load_training?guid=517c1864cac8a386&correlation_id=6afdf1d9-7a01-4d13-93d0-a966cf22ac7b
Submission: On January 22 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST https://attach.business-services.org/training/acceptance?correlation_id=6afdf1d9-7a01-4d13-93d0-a966cf22ac7b

<form action="https://attach.business-services.org/training/acceptance?correlation_id=6afdf1d9-7a01-4d13-93d0-a966cf22ac7b" class="well form-inline" id="training-form" method="POST"><button class="classname" data-text="acknowledge_button"
    type="submit" dir="ltr">Acknowledge</button></form>

Text Content

English - US
 * Arabic
 * Chinese - Simpl
 * Danish
 * Dutch
 * Finnish
 * French - FR
 * German
 * Greek
 * Hindi
 * Italian
 * Japanese
 * Korean
 * Romanian
 * Spanish - LatAm


THIS IS A SIMULATION - HAD THIS BEEN REAL, YOU WOULD HAVE BEEN PHISHED

Phishing is an attempt, usually through email, to gather personal information or
to compromise technology for the purpose of financial gain or malicious
activities.

Phishing is not just an IT problem; Phishers target every level of employee from
the board to interns and provide a significant threat to the company. You are
the last line of defense against this threat.

If this was an actual phishing email, the link may have contained viruses or
spyware which would compromise your computer. Ultimately, if your machine is
infected it could lead to theft or corruption of data and may result in service
disruption, reputational damage and significant money loss.

Phishers know that they can manipulate people by stirring up their emotions.
Here, they played on your curiosity, but they might also try to play on feelings
of fear, empathy, urgency or even greed.

Here are some tips to help protect your employer's data and your own personal
information:

 * Be vigilant!
 * Delete unsolicited emails and do not open any links or attachments they
   contain.
 * If you receive a suspicious email (spam, scan or suspected virus) attach the
   message to a blank email and forward it to IT security and then delete it.
 * Ensure that your PC/laptop is kept up to date with patches and antivirus
   definitions.

We all have a responsibility to protect the company's information - don't be an
easy target! If you have any questions or need more information please contact
your IT security group.

By clicking the button below you agree that you have read and completed this
training.

Acknowledge

This phishing simulation was provided by your employer to help teach you to
recognize commonly-used phishing risks. To appear as realistic as possible, it
may contain the name, brand or logo of unaffiliated third parties. Please do NOT
contact the company that is named or whose brands or logos were used. If you
have any questions or concerns about phishing emails, please contact only your
own employer. Confidential and Proprietary - Privacy Policy