login.028426.com Open in urlscan Pro
54.83.101.48  Public Scan

URL: http://login.028426.com/yellow/eaeca4/367489bf-a37f-401a-b1b7-5c1918ce9ae1/
Submission: On December 17 via manual from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Skip to Main Content

RESILIENCE METER

0%

100%

EnglishEnglish
 * AfrikaansAfrikaans
 * Bahasa IndonesiaIndonesian
 * ČeštinaCzech
 * DanskDanish
 * DeutschGerman
 * EnglishEnglish
 * Español [EU]Spanish [EU]
 * Español [LA]Spanish [LA]
 * EλληνικάGreek
 * Français [EU]French
 * Français [CA]French [CA]
 * ItalianoItalian
 * MagyarHungarian
 * NederlandsDutch
 * NorskNorwegian
 * PolskiPolish
 * Português [BR]Portuguese [BR]
 * Português [EU]Portuguese [EU]
 * RomânăRomanian
 * SlovenčinaSlovak
 * SrpskiSerbian
 * SuomiFinnish
 * SvenskaSwedish
 * TürkçeTurkish
 * РусскийRussian
 * العربيةArabic
 * 한국어Korean
 * 日本語Japanese
 * 简体中文Chinese Simplified
 * 繁體中文Chinese Traditional

No results found

This was a Mass general Brigham authorized phishing simulation


YOU ARE THE LAST LINE OF DEFENSE.

Phishing is the leading cause of data breaches. Please scroll to learn how to
identify future phishing attempts to protect your organization. Thanks for your
participation!

 
Video Transcript

 

Pointer moving over inbox button and the button is clicked.

 




QUICK TIPS

 
01.

Keep your emotions
in check.

02.

Look at the
domain name.

03.

Update software
frequently.

04.

Always
Verify.


DATA BREACHES

If you’ve seen the news, you’ve probably heard of at least one data breach.

A data breach is a security incident in which company or customer data has been
illicitly accessed or stolen.

Most of us have felt the impact of a data breach before. But many breaches are
discovered weeks or months after they occur. Fortunately, there are steps that
you can take to minimize the risk of a data breach.


PASSWORD SECURITY

A strong password will reduce your risk of being compromised. Strong passwords
are complex, random, unique, and changing. Click on each characteristic of a
strong password to learn more about it:

Complex

A strong password is as lengthy as possible and includes uppercase letters,
lowercase letters, numbers, and special characters.

Random

Use random combinations of characters and avoid easy-to-guess phrases like the
name of your first pet or high school mascot.

Unique

Use a different password for every account. Otherwise, a single data breach can
compromise several accounts.

Changing

A data breach can compromise any account and may not be disclosed for weeks or
months. Stay ahead of the attackers by changing your passwords regularly.


KEEP WORK AND PERSONAL SEPARATE

Only use work-related email addresses for work-related tasks, and personal email
addresses for personal tasks. This helps to protect your personal information if
our organization is targeted, and vice versa.


REPORT SUSPICIOUS ACTIVITY

Our organization could become the target of a data breach. Many breaches start
with, or involve a phishing email. Reporting suspicious emails and other
suspicious activities allows us to investigate, identify, and stop attacks on
our network and information. This makes you a valuable partner in our security.

 


REMEMBER, YOU ARE THE LAST LINE OF DEFENSE AGAINST PHISHING.

If you receive a suspicious email, report it immediately.

Report Phishing
 


THANK YOU FOR YOUR PARTICIPATION.

Phishing Education: Data Breaches