Viewable by the world
Group Access to Cyber Security Website
Can VIEW the space: all-lbnl-users ,  anonymous , 
Can EDIT the space:
Can ADMINISTER the space:

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The goal of this simulated phishing campaign is to help you to learn how to spot a phish and report it to the Cyber Security team. Accurately reporting phishing scams can allow the Cyber Security team to alert other employees and block future phishes. 

 

Privacy 

 

Information about individual responses will NOT be shared with supervisors or HR. Passwords will NOT be stored.

...

 - Click here to fill out the form: https://docs.google.com/a/lbl.gov/forms/d/1CyLC5yKCgwz9bvUOGLrC37zOJ0Vi0Y1EjnU01no5CCE 

What is Phishing?

An important part of this campaign is distinguishing between what is a phishing email, a targeted phishing email, and spam.

...

  - For more information on phishing see the Cyber Security Resources page on Spam, Phishing, Targetted Phishing

How do I report a phishing email?

Phishme Reporter for Google Chrome

The tool we are using to send and track simulated phishing emails comes has a Chrome extention called the Phishme Reporter.

...

https://chrome.google.com/webstore/detail/phishme-reporter/dgbbjjedalfdhoeamabpnnepfjaegmop

Reporting for non-Chrome users

Send an email to [email protected] reporting the incident and include the source code of the phishing email as an attachment.

If you do not know how to attach the source code click here to learn how to forward the source code of an email as an attachment: Forward Email As Attachment

Feedback 

In order to improve this program please fill out this form:

https://docs.google.com/a/lbl.gov/forms/d/1mOLv2WmepMK33BW2bHg--oc9kguK1I0_xOX8gDoC2kM/edit?ts=5772e843

Examples of Simulated Phishes (Coming Soon)