security-policy-as-code-framework-model

1. Overview

This document provides non-mandatory guidance to help all employees identify and avoid phishing attacks. Phishing is a fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details by disguising as a trustworthy entity in an electronic communication. Being vigilant is our first and most important line of defense.

2. Key Recommendations

2.1. How to Spot a Phishing Email

Look out for these common red flags. A single flag may not be definitive, but the presence of multiple flags is highly suspicious.

2.2. What to Do If You Suspect Phishing

If you suspect an email is a phishing attempt:

  1. Do not click any links.
  2. Do not open any attachments.
  3. Do not reply to the email.
  4. Report the email immediately. Use the “Report Phishing” button in your email client, or forward the email as an attachment to the Incident Response Team by following the incident-reporting-process.md.

When in doubt, always err on the side of caution and report it.

3. Helpful Resources

[Links to external documentation, tools, or other resources.]