PhishingBox Logo
Banner

What You'll Learn Today:

Request Does Not Equal Response

If you get a request for ANYTHING, don't respond to it until it can be verified.

Request Response Verification Steps:

If you haven't attempted to log in, don't respond.

Check with the vendor or supplier directly to confirm the request is legitimate.

Log in via a known, secure link on your next access attempt. Do not use the suspicious link provided.

Report any suspicious activity to your IT department to identify and eliminate the threat.

Question Icon

If you haven't attempted to log in, don't respond.

Question Icon

Check with the vendor or supplier directly to confirm the request is legitimate.

Question Icon

Log in via a known, secure link on your next access attempt. Do not use the suspicious link provided.

Question Icon

Report any suspicious activity to your IT department to identify and eliminate the threat.

If you pause, there's a cause. Always remain vigilant and suspicious of irregular and odd requests you haven't asked to receive.

Copyright © PhishingBox