Weekly Cybersecurity Awareness: Phishing, Malware & Good Practices

  • Last Created On Sep 02, 2025
  • 25
0 0

Weekly Cybersecurity Awareness: Phishing, Malware & Good Practices

Owner: IT Department
Audience: All staff
Applies to: Email, Teams/Slack, SMS, web browsing, and file downloads


Summary

This article equips you to spot and report phishing attempts, avoid malware links, and follow everyday practices that keep our organisation secure. Share it with your teams and refer back to it whenever something looks suspicious.


1) How to Spot a Phishing Message

Look for one or more of these red flags:

  • Sender anomalies: Misspelled domain (e.g., micros0ft.com), personal email for business matters, or display-name spoofing.

  • Link tricks: Button text says one thing, but the real URL (hover to preview) is unrelated or shortened.

  • Urgency or fear: “Immediate action required”, “account will be closed”, “final warning”.

  • Unusual attachments: Unexpected invoices, ZIP/ISO/IMG files, or macros-enabled Office docs.

  • Poor quality: Spelling/grammar mistakes, off-brand logos or colours.

  • Requests for sensitive data: Passwords, MFA codes, card/bank details, or internal documents.

  • Context mismatch: “Reply to HR” about a system you don’t use; or you weren’t expecting the message.

Quick check: If it provokes a strong emotion (panic, curiosity, reward), pause and verify before you click.

Examples (for training)

  • “Payroll Update” with a link to payr0ll-secure[.]infoPhishing.

  • “DocuSign” requesting re-login via docs-verify[.]comCredential harvest.

  • “CEO request” asking you to buy gift cards urgently → Business Email Compromise (BEC).

  • “Package Delivery” with an attachment Label.zipMalware dropper.


2) Malware & Suspicious Links

  • Avoid downloading software from pop‑ups or unknown websites.

  • Never open unsolicited attachments, especially .exe, .js, .vbs, .scr, .iso, .img, .zip.

  • Treat macro-enabled Office files (.docm, .xlsm) as high risk.

  • Prefer official app stores or vendor sites; verify the publisher.

  • Check that sites using login forms show HTTPS (padlock) and a domain you recognise.

Remember: A single click on a malicious link can install malware or steal credentials.


3) What To Do If You’re Unsure

  1. Do not click links or open attachments.

  2. Do not reply or forward to others (except Security).

  3. Report it immediately (see Reporting below).

  4. Await guidance from IT/Security before deleting.


4) If You Already Clicked or Entered Details

  1. Disconnect from the internet (Wi‑Fi off / unplug network cable) if you downloaded or ran a suspicious file.

  2. Contact Security immediately via security-team@cityandcommercial.com or submit a ticket at https://smart-support.smartek.co.uk.

  3. Change your password for affected accounts; ensure MFA is on.

  4. Inform Security of any credentials you entered and the exact time.

  5. Do not power off your device unless instructed (we may need live forensics).

  6. Monitor for unusual account activity and report it.


5) Reporting Procedures

Report an email in Outlook (Desktop/Web)

Report in Gmail (if used)

Include when reporting

  • A short note on why it looked suspicious.

  • Time received, sender, and any action taken (clicked, opened, replied).


6) Everyday Good Practices

  • MFA everywhere: Enable and keep your second factor secure.

  • Unique, strong passwords: Use a password manager; never reuse passwords across sites.

  • Lock devices: Use strong device PIN/biometrics; lock screens when away.

  • Update promptly: Install OS and app updates; don’t postpone restarts.

  • Least privilege: Request only the access you need; avoid using admin accounts for routine work.

  • Data handling: Don’t export or share data to personal accounts; avoid unauthorised cloud tools.

  • Verify requests: For payment/bank details changes or document requests, call a known number to confirm.

  • Clean browsing: Avoid pirated software and “free” coupon/streaming sites; they’re common malware hosts.

  • ✔️ Make sure the IT Department has enabled these safeguards and enforced strong password policies.


7) Mobile & Messaging (SMS/WhatsApp/Teams/Slack)

  • Treat links in SMS/DMs like email links—verify first.

  • Do not install apps from unknown sources; review app permissions.

  • Beware of impersonation in Teams/Slack (similar display names, external guests).

  • Report suspicious DMs to Security.


8) USB & Removable Media

  • Do not plug in unknown USB sticks or drives.

  • Use company‑approved encrypted media only.

  • Scan removable media before opening files.


9) Social Engineering Scenarios (Quick Guide)

  • Vishing (phone): Caller pressures you to reveal codes or transfer money → hang up, call back via official number.

  • Smishing (SMS): Delivery/HR/Bank texts with urgent links → verify via the official app/portal.

  • BEC: Unexpected wire instructions or supplier bank‑detail changes → require dual approval and out‑of‑band verification.


10) Secure Remote Work

  • Use company VPN on public Wi‑Fi; avoid untrusted hotspots.

  • Keep work data off personal devices and cloud accounts.

  • Store files only on approved locations (SharePoint/OneDrive/Team drives).


11) Quick “Do / Don’t” Checklist

Do

  • Hover to preview links first.

  • Report suspicious messages immediately.

  • Use MFA and strong passwords.

  • Update devices and software.

Don’t

  • Don’t share passwords or MFA codes.

  • Don’t download untrusted files.

  • Don’t rush when a message feels urgent.

  • Don’t move company data to personal tools.


12) FAQ

Q: I received a suspicious email that mentions a colleague. What should I do?
A: Verify with the colleague via a known channel (phone/Teams) and report the email.

Q: Can I forward suspicious emails to my manager?
A: Forward only to security-team@cityandcommercial.com. We will notify relevant stakeholders.

Q: How do I know if a link is safe?
A: Hover to preview, check the domain, and when in doubt, type the official address manually in the browser.

Q: Are QR codes safe?
A: Treat them like links—only scan trusted sources and check the URL before proceeding.


13) Training & Refreshers

  • Refer to the Security Awareness Portal for short modules on phishing, password hygiene, and safe browsing.

  • Managers: schedule a 10‑minute team refresher using this article once per quarter.


14) Contact

Keep this page bookmarked. If it looks odd, report it—when in doubt, we’ll check it out.


Views: 25

Recent Articles

  • Weekly Cybersecurity Awareness: Phishing...
    25
  • 🔐 Weekly Cybersecurity Awareness – Stay...
    28
  • How to access call recording on Amazon C...
    128
  • How to Spot and Avoid Spam Emails: A Gui...
    330
  • How to access IT Training Portal ?
    460

Popular Articles

  • Call Trace Report
    Exporting Abandoned Call Reports in Amaz...
    1125
  • Common Issues
    Log in and log out of the Amazon Connect...
    981
  • Common Issues
    How to use the agent workspace to chang...
    874
  • How to Open and Use a Shared Mailbox in...
    873
  • Common Issues
    Transfer calls to a quick connect or ext...
    816