TMHE Security Awareness

Dear TMHE employee or TMHE managed consultant,

Important, do not directly close this window as it is part of TMHE security awareness and education during the COVID-19 outbreak.

You have been directed to this page since you have taken part in a phishing-exercise/test triggered by TMHE IS/IT-department. This exercise is part of TMHE security awareness, as directed by TMHE Management Team, with the ambition that you as resource is given the opportunity to learn more on how to manage malicious activity towards TMHE.

Note that you will not be reprimanded for this, this is part of TMHE awareness for all TMHE employees and consultants, where we will measure statistics for trend purpose only.

Since you have clicked on a link in a phishing-test email, and provided your account details on a phishing-test site, you have not managed the test according to TMHE best practice. Read therefore the below information to learn more.
These phishing exercises have been crafted by TMHE with the look and feel for ongoing phishing campaigns during the COVID-19 outbreak, this to allow you as an employee to learn more about how malicious emails can look like.

Utilize the below to detect malicious emails:

  • Too good to be true? Why me? Why now?
  • The email was sent from an email-address that is easily distinguishable as an address that you should not normally receive an email from.
  • The email has misspelled wording.
  • The link provided seems legitimate at first glance, but when hovering above the link, the address is not the same.


Therefore
, the email should have been reported to Service Desk as a phishing attempt to allow proper blocking of sender and/or links, and thereafter deleted.

See information in the following (link).

Sven Littorin, Information Security and IT Risk Manager Toyota Material Handling Europe