TMHE Security Awareness

Dear TMHE employee or TMHE managed consultant,

Important, do not directly close this window as it is part of TMHE security awareness and education.

You have been directed to this page as part of TMHE security awareness, with the ambition that you as resource is given the opportunity to learn more on how to manage malicious activity towards TMHE.

Phishing attempts are performed by malicious actors, with the goal to obtain your credentials, contact information, to place malware on your device, or to gain trust for further malicious purposes. TMHE has technical measures in place to detect and block these attempts, but not all attempts can be blocked, and therefore it is vital that you as TMHE resource correctly manages these attempts, as first line of defence.

Since you have clicked on a link in a phishing-test email, and possibly provided your account and password details on a phishing-test site, you have not managed the test according to TMHE best practice. Read therefore the below information to learn more.

TMHE best practice is the following:

  • Be aware, always distrust emails, and report to Service Desk if confirmed malicious purpose, or in doubt.
  • Verify the email address, often it is misspelled or from a non-TMHE domain.
  • Do not click on links in emails. Always verify if the link can be trusted.
  • Do not open suspicious attachments. If in doubt save on desktop and run an AntiMalware scan.
  • Do not give out account-names or credentials.
    Always verify financial transactions on other channel than email.

    Toyota Material Handling Europe Information and IT Security Group