TMHE Security Awareness

Dear TMHE employee or TMHE managed consultant,

Important, do not directly close this window as it is part of TMHE security awareness and education.

You have been directed to this page since you have taken part in a phishing-exercise/test triggered by TMHE IS/IT-department. This exercise is part of TMHE security awareness, as directed by TMHE Management Team, with the ambition that you as resource is given the opportunity to learn more on how to manage malicious activity towards TMHE.

Note that you will not be reprimanded for this, this is part of TMHE awareness for all TMHE employees and consultants, where we will measure statistics for trend purpose only.

Since you have clicked on a link in a phishing-test email, and provided your account details on a phishing-test site, you have not managed the test according to TMHE best practice. Read therefore the below information to learn more.

First, the email was sent from an email-address that is easily distinguishable as an address that you should not normally receive an email from: devops@microsoftazure.com
Take therefore consideration in emails that are sent from someone you do not know.

Secondly, the email has misspelled wording.

Third, the link provided seems legitimate at first glance, but when hovering above the link, the following is shown:


phishing-attempt.jpg

This is a strong indication the the link is malicious and is not to be clicked, as the link is different from the visual appearance.

Therefore, the email should have been reported to Service Desk as a phishing attempt to allow proper blocking of sender and/or links, and thereafter deleted.

See information in the following (link).

Sven Littorin, Information Security and IT Risk Manager Toyota Material Handling Europe