You were just caught by a phishing simulation sent by the Optimity cyber security team



any personal or account credential information you provided has been discarded

The Poison Apple

All successful compromises have one thing in common, an initial exploit. No matter how many security controls an organisation deploys, no matter how sophisticated a network, there is no way to patch human behaviour. The most significant information security risks today are human. Attackers realise that the most efficient way to gain initial access is to have someone let them in by enticing you to click a link, execute an application,
or expose a password.

Phishing attacks are most successful when the attacker can convince the victim to know, like and trust them.

Be Cyber Aware. Protect Yourself:

  • Hover and verify hyperlinks
  • Check your headers and verify the sender's address
  • Verify any file extensions before execution
  • When in doubt, call the sender to confirm they sent the message or if still concerned, email the Optimity Cybersecurity team here
  • More information can be found here 
Optimity IT

 

Optimity IT Limited | Zetland House | 5-25 Scrutton Street | London | EC2A 4HJ

© Copyright 2023