Links and attachments are favorite entry points for cybercriminals. Learn to examine them carefully before interacting.
On a computer, simply move your mouse cursor over the link WITHOUT clicking. The real URL address will usually be displayed at the bottom left of your browser.
On a smartphone or tablet, press and hold your finger on the link. A pop-up window will display the full URL.
Do not open the link. Go directly to the relevant site by typing the address into your browser or using a saved favorite.
If you were not expecting to receive a document from this sender, be extremely cautious.
Be very vigilant with executable files (.exe), archives (.zip, .rar), or Office documents (.doc, .docx, .xls, .xlsx, .ppt, .pptx) if they come from an unexpected source, especially if they ask to enable macros.
Does the content of the email justify the presence of an attachment? Is the file name logical?
Do not download or open the attachment. Contact the sender by another means (phone, new email typed manually) to confirm they sent it.
Phishing is no longer limited to generic emails. Cybercriminals are developing new techniques to target you.
A highly targeted attack aimed at an individual or a small group within the company. The email is very personalized and uses specific information about the target to appear legitimate.
Specifically targets senior executives or individuals with privileged access to financial or sensitive information.
Phishing carried out via SMS. The message contains a malicious link or asks to call a fraudulent number.
Phishing via phone call (Voice Phishing). The fraudster pretends to be a trusted contact (bank, technical support, administration) to extract information from you.
A technique that redirects traffic from a legitimate website to a fake site without the victim even clicking a link, often by modifying system files on the computer.
CEO fraud or supplier fraud. The attacker impersonates a manager or a business partner to order an urgent bank transfer.
Use this quick checklist to examine suspicious emails before clicking or replying.
Check the full email address. Is it the official address of the organization, or are there subtle variations?
Does the email contain spelling mistakes, grammatical errors, or strange phrasing?
Is it impersonal ("Dear customer", "Hello user") or does it use your name?
Hover over the link (without clicking!) to see the real URL. Does it match the expected official site?
Are you expecting this attachment? Is the file type suspicious?
Does the message create a sense of urgency or contain threats to push you to act quickly?
Is the request (transfer, information, action...) strange or unexpected in this context?
Does the email ask for your password, bank details, or other confidential information?
If in doubt, verify the information by contacting the organization directly via their official website or by phone (do not reply to the suspicious email).
If the email seems suspicious, report it to your IT department.
If you think you have clicked on a phishing link, opened a suspicious attachment, or entered professional information, act quickly and correctly.
Time is a key factor in limiting the damage.
Disconnect from the company network (unplug the Ethernet cable, disable Wi-Fi). Do not turn off your computer unless instructed by IT, as this could prevent evidence collection.
Do not delete the suspicious email or any potentially downloaded files. They are important for incident analysis.
If you have entered your session password or any other professional password, change it immediately. Ideally, do it from another secure device if possible.
Does the message create a sense of urgency or contain threats to push you to act quickly?
The IT team will need your cooperation to investigate and clean the systems if necessary.
Allows for quick identification and blocking of the threat to protect other employees.
Limits the spread of potential malware on the company's network.
Helps the security team understand the tactics used and strengthen defenses.
Good password practices and the use of multi-factor authentication (MFA) add essential layers of security.
A password should ideally contain at least 12 characters.
Mix uppercase, lowercase, numbers, and special characters (!@#$%^&*).
NEVER use the same password for different accounts, especially professional and personal ones.
Do not use your name, date of birth, a relative's name, a pet's name...
A phrase that is easy for you to remember but hard to guess (e.g., "MyCatLovesBlueKibble!7").
A secure tool to generate and store your complex passwords.
MFA requires at least two proofs of your identity to log in (something you know - password, something you have - phone/token, something you are - fingerprint/facial recognition).
Even if a fraudster gets your password (through phishing, for example), they will not be able to log in without the second authentication factor.
Enable MFA on all your professional and personal accounts that offer it (email, VPN, apps, banks, social networks...).
A common phishing technique is to create a sense of urgency or fear to push you to act quickly without thinking or checking.
"You have 24 hours to respond", "Your account will be deleted soon if you do not act".
"Your account has been compromised", "You risk a fine", "Your delivery cannot be completed".
A supervisor requesting an urgent bank transfer by email, an immediate gift card request, etc.
Use of capital letters, excessive exclamation marks, dramatic phrasing.
An important email generally does not require immediate action under penalty of disastrous consequences. Breathe and calmly analyze the message.
Avoid clicking on links or opening attachments if you feel pressured.
If the message claims to be from a person or organization you know, contact them directly through a usual means (phone, official app, website) to verify the information. DO NOT use the contact details provided in the suspicious email.
If you have any doubt about an email, talk to a colleague or contact your IT department before acting.
With PhishTrainer, transform your employees into the first line of defense against phishing. Simulate, raise awareness, and secure your company for the long term with realistic and engaging phishing campaigns.
See the demonstration