login.028426.com
Open in
urlscan Pro
54.83.101.48
Public Scan
URL:
http://login.028426.com/yellow/eaeca4/367489bf-a37f-401a-b1b7-5c1918ce9ae1/
Submission: On December 17 via manual from US — Scanned from DE
Submission: On December 17 via manual from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Skip to Main Content RESILIENCE METER 0% 100% EnglishEnglish * AfrikaansAfrikaans * Bahasa IndonesiaIndonesian * ČeštinaCzech * DanskDanish * DeutschGerman * EnglishEnglish * Español [EU]Spanish [EU] * Español [LA]Spanish [LA] * EλληνικάGreek * Français [EU]French * Français [CA]French [CA] * ItalianoItalian * MagyarHungarian * NederlandsDutch * NorskNorwegian * PolskiPolish * Português [BR]Portuguese [BR] * Português [EU]Portuguese [EU] * RomânăRomanian * SlovenčinaSlovak * SrpskiSerbian * SuomiFinnish * SvenskaSwedish * TürkçeTurkish * РусскийRussian * العربيةArabic * 한국어Korean * 日本語Japanese * 简体中文Chinese Simplified * 繁體中文Chinese Traditional No results found This was a Mass general Brigham authorized phishing simulation YOU ARE THE LAST LINE OF DEFENSE. Phishing is the leading cause of data breaches. Please scroll to learn how to identify future phishing attempts to protect your organization. Thanks for your participation! Video Transcript Pointer moving over inbox button and the button is clicked. QUICK TIPS 01. Keep your emotions in check. 02. Look at the domain name. 03. Update software frequently. 04. Always Verify. DATA BREACHES If you’ve seen the news, you’ve probably heard of at least one data breach. A data breach is a security incident in which company or customer data has been illicitly accessed or stolen. Most of us have felt the impact of a data breach before. But many breaches are discovered weeks or months after they occur. Fortunately, there are steps that you can take to minimize the risk of a data breach. PASSWORD SECURITY A strong password will reduce your risk of being compromised. Strong passwords are complex, random, unique, and changing. Click on each characteristic of a strong password to learn more about it: Complex A strong password is as lengthy as possible and includes uppercase letters, lowercase letters, numbers, and special characters. Random Use random combinations of characters and avoid easy-to-guess phrases like the name of your first pet or high school mascot. Unique Use a different password for every account. Otherwise, a single data breach can compromise several accounts. Changing A data breach can compromise any account and may not be disclosed for weeks or months. Stay ahead of the attackers by changing your passwords regularly. KEEP WORK AND PERSONAL SEPARATE Only use work-related email addresses for work-related tasks, and personal email addresses for personal tasks. This helps to protect your personal information if our organization is targeted, and vice versa. REPORT SUSPICIOUS ACTIVITY Our organization could become the target of a data breach. Many breaches start with, or involve a phishing email. Reporting suspicious emails and other suspicious activities allows us to investigate, identify, and stop attacks on our network and information. This makes you a valuable partner in our security. REMEMBER, YOU ARE THE LAST LINE OF DEFENSE AGAINST PHISHING. If you receive a suspicious email, report it immediately. Report Phishing THANK YOU FOR YOUR PARTICIPATION. Phishing Education: Data Breaches