Page 11 - From the desk of HR March 2020 Edited
P. 11
Cyber Criminals will use
phishing tactics to gain access to victim’s email.
Then use this access to send phishing emails to
the victim’s known contacts. If you know the
sender or not, always carefully review the
email. If you suspect that the email is a
phishing email, do not click on any link or attachment.
Safety