Contact the sender using a known method to verify the request - This is correct. If an email requests sensitive information, the employee should verify the request's legitimacy by contacting the sender directly through a trusted method, such as a phone call or an official email address found in company records. This step helps confirm whether the email is genuine or a phishing attempt.
Reply to the email asking for more information - Replying to the email is not safe, as it could confirm the employee's email address to a potential attacker and might lead to further phishing attempts or malicious interactions.
Ignore the email and do nothing - Ignoring the email might leave a genuine request unaddressed or allow a phishing attempt to go unreported. It is better to verify the email's legitimacy.
Forward the email to a colleague for their opinion - While seeking a colleague's opinion might help, it does not ensure the email's legitimacy. Verification should be done directly with the sender using a trusted communication channel.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is phishing and how can I recognize it?
Open an interactive chat with Bash
What are some trusted methods to verify a sender's identity?
Open an interactive chat with Bash
What should I do if I suspect an email is a phishing attempt?