Information Security Section
AISIN Corporation 

 

Scroll down and read the whole of this page.

 

 

You failed to recognize the suspicious email in this training.
Please read this explanation carefully and review how to identify suspicious email.

 

1. Reconfirmation of four basic actions against suspicious e-mails

  1. Identify suspicious e-mails.

  2. Never open attached files / linked URL.

  3. If you find a suspicious e-mail, report to the suspicious e-mail reporting desk.

  4. Delete the suspicious e-mails.

* When you have a "suspicious e-mail report button" on your terminal:
   You do not need to delete suspicious e-mails as requested in the above 4 as report on and deletion of the relevant suspicious e-mails
   are automatically executed at the time you press the report button.
* When you do NOT have a "suspicious e-mail report button" on your terminal:
   Transfer the suspicious e-mail to the suspicious e-mail reporting desk (aisin@emea.managedphishme.com) to report on it and then delete
   the suspicious e-mail.

2. Explanation about this training 
   How to identify suspicious email
 

3. How to identify suspicious e-mails

What are the e-mails that attackers use to attack receivers?
Click on an image of a person below and confirm key points for identification.

Click the X to close the email and view other emotions.

Curiosity

Urgency

Fear

Reward

If you suspect that you have received a spear phishing email at work, follow our procedures for reporting it immediately.

 

 

Contact
 GA-SAT Support Desk ( AI-GASAT@aisin.co.jp )

 

©Cofense

©Cofense