How to respond effectively to phishing?

Modifié le  Lun, 30 Déc., 2024 à 10:56 H


Step 1: I See a Suspicious Email or SMS 


On Outlook Web:

  1. Display the suspicious email: Log in to your Outlook account online and click on the email you want to report.
  2. Click the three dots: In the top-right corner of the email, click the three dots to open the dropdown menu.
  3. Select "Report Message": In the dropdown menu, select "Report," then choose the most appropriate option (such as "Phishing" or "Junk").


On Outlook Desktop:

  1. Select the suspicious email: Open the Outlook application on your computer and display the email in question.
  2. Go to the "Home" tab.
  3. Click "Report."
  4. Choose "Report Phishing" (select the most appropriate option, such as "Phishing" or "Junk").


Reminder: Difference Between "Phishing" and "Junk"

Phishing:

  • Purpose: To steal personal information (passwords, card numbers, etc.).
  • Signs: Request for personal info, suspicious links, urgent messages.

Junk (Spam):

  • Purpose: Unsolicited advertising, promotion of products or services.
  • Signs: Unwanted commercial offers, advertising content, mass mailing.


Step 2: I Clicked a Link or Provided Generic Information 

Report to Internal IT Support at Human & Work

If you believe any information may have been compromised due to receiving a suspicious email, it is critical to report the incident to Human & Work's internal IT support via the following email address:


- support@humanandwork.com -

For example:

  • Phone number or email provided: If you gave out generic information in response to a suspicious email.


Step 3: I Provided Critical Information (Password, IBAN, etc.) 

Here are some scenarios where reporting is especially important:

  • Password used on a suspicious site: If you entered a password after clicking a link in a suspicious email.
  • Microsoft session involved: If you were redirected to a Microsoft login page and entered your credentials.
  • Banking information provided: If you entered banking or credit card information.
  • Access to sensitive documents: If confidential documents or sensitive information were shared.

→ Contact the IT Systems Manager by phone. 

Cet article a-t-il été utile ?

C'est super !

Merci pour votre commentaire

Désolé ! Nous n'avons pas pu vous être utile

Merci pour votre commentaire

Dites-nous comment nous pouvons améliorer cet article !

Sélectionner au moins l'une des raisons
La vérification CAPTCHA est requise.

Commentaires envoyés

Nous apprécions vos efforts et nous allons corriger l'article