You’ve been Hacked!

You’ve been part of a phishing simulation!

As a financial services provider in Australia, safeguarding against online fraud is critical to protecting our clients and maintaining their trust. With online scams becoming increasingly sophisticated, it’s vital that we stay vigilant, proactive, and informed about the latest fraud schemes.

Each of us plays a role in preventing fraud—whether by identifying suspicious activity, reporting potential threats, or educating clients on how to protect themselves. Together, we can strengthen our security practices and reinforce our reputation as a trusted business.

Learning Tips for Recognizing Phishing Emails

1. Check the Sender’s Email Address:

• Look for subtle misspellings or domains that don’t match the official company domain. For example, hr-support@yourcompny.com instead of hr-support@yourcompany.com.

• Be cautious if the sender uses public domains like @gmail.com instead of a corporate email.

2. Hover Over Links Before Clicking:

• Always hover over hyperlinks to see the actual URL. If the URL doesn’t match the organization’s official domain or looks suspicious (e.g., contains random characters or unusual subdomains), do not click it.

3. Beware of Generic Greetings:

• Legitimate company emails will often use your name. Be cautious of emails starting with “Dear Employee” or “Valued User.”

4. Watch for Urgent Language or Threats:

• Phishing emails often create a sense of urgency, such as “Complete this immediately,” “Action required by 5:00 PM,” or “Your account will be suspended.” Pause and verify before acting.

5. Look for Spelling and Grammar Errors:

• Professional organizations rarely send emails with typos, poor grammar, or awkward phrasing. These can be red flags.

6. Check for Inconsistent Branding:

• Phishing emails might have outdated or pixelated logos, mismatched fonts, or incorrect colors in the branding.

7. Verify Unusual Requests:

• Be suspicious if you’re asked to provide personal or sensitive information via email or to click on a link to confirm account details. Legitimate organizations usually won’t ask for this.

8. Inspect the Contact Information:

• If a phone number or email address is included, cross-check it with official company directories or websites before responding.

9. Avoid Clicking Attachments or Links from Unknown Sources:

• If you’re not expecting the email or attachment, verify its legitimacy with the sender through another trusted communication channel (e.g., phone call).

10. Report Suspicious Emails Immediately:

• Use your company’s phishing report tool or contact the IT/security team if you suspect an email is a phishing attempt. Reporting helps protect everyone in the organization.

Share your learning,