Page 11 - From the desk of HR March 2020 Edited
P. 11

Cyber Criminals will use


  phishing tactics to gain access to victim’s email.

  Then use this access to send phishing emails to

  the victim’s known contacts. If you know the

  sender or not, always carefully review the
  email. If you suspect that the email is a



  phishing email, do not click on any link or attachment.

                                                      Safety
   6   7   8   9   10   11   12   13   14   15