attach.business-services.org
Open in
urlscan Pro
44.193.95.232
Public Scan
Submitted URL: https://attach.business-services.org/517c186c0ac8a378?l=32
Effective URL: https://attach.business-services.org/load_training?guid=517c1864cac8a386&correlation_id=6afdf1d9-7a01-4d13-93d0-a966cf22ac7b
Submission: On January 22 via manual from US — Scanned from DE
Effective URL: https://attach.business-services.org/load_training?guid=517c1864cac8a386&correlation_id=6afdf1d9-7a01-4d13-93d0-a966cf22ac7b
Submission: On January 22 via manual from US — Scanned from DE
Form analysis
1 forms found in the DOMPOST https://attach.business-services.org/training/acceptance?correlation_id=6afdf1d9-7a01-4d13-93d0-a966cf22ac7b
<form action="https://attach.business-services.org/training/acceptance?correlation_id=6afdf1d9-7a01-4d13-93d0-a966cf22ac7b" class="well form-inline" id="training-form" method="POST"><button class="classname" data-text="acknowledge_button"
type="submit" dir="ltr">Acknowledge</button></form>
Text Content
English - US * Arabic * Chinese - Simpl * Danish * Dutch * Finnish * French - FR * German * Greek * Hindi * Italian * Japanese * Korean * Romanian * Spanish - LatAm THIS IS A SIMULATION - HAD THIS BEEN REAL, YOU WOULD HAVE BEEN PHISHED Phishing is an attempt, usually through email, to gather personal information or to compromise technology for the purpose of financial gain or malicious activities. Phishing is not just an IT problem; Phishers target every level of employee from the board to interns and provide a significant threat to the company. You are the last line of defense against this threat. If this was an actual phishing email, the link may have contained viruses or spyware which would compromise your computer. Ultimately, if your machine is infected it could lead to theft or corruption of data and may result in service disruption, reputational damage and significant money loss. Phishers know that they can manipulate people by stirring up their emotions. Here, they played on your curiosity, but they might also try to play on feelings of fear, empathy, urgency or even greed. Here are some tips to help protect your employer's data and your own personal information: * Be vigilant! * Delete unsolicited emails and do not open any links or attachments they contain. * If you receive a suspicious email (spam, scan or suspected virus) attach the message to a blank email and forward it to IT security and then delete it. * Ensure that your PC/laptop is kept up to date with patches and antivirus definitions. We all have a responsibility to protect the company's information - don't be an easy target! If you have any questions or need more information please contact your IT security group. By clicking the button below you agree that you have read and completed this training. Acknowledge This phishing simulation was provided by your employer to help teach you to recognize commonly-used phishing risks. To appear as realistic as possible, it may contain the name, brand or logo of unaffiliated third parties. Please do NOT contact the company that is named or whose brands or logos were used. If you have any questions or concerns about phishing emails, please contact only your own employer. Confidential and Proprietary - Privacy Policy