An employee receives a suspicious message instructing them to verify their account by clicking a link and submitting their login details. Just last week, the staff had a seminar discussing the risks of deceptive electronic communications. What should the employee do next?
Follow the instructions in the message, assuming it is a standard security procedure
Send a response inquiring about the authenticity of the message
Inform the company's security personnel regarding the message
Access the link to verify its source but do not enter any login details
|Applications and Software
|Software Development Concepts
|IT Concepts and Terminology