Phish Alert Process: Was a Threat Detected?
What happens after you push that Phish Alert Button?
Rest assured, it doesn’t disappear into a black hole. It starts a chain of events that helps us identify potential threats. You can click the link if you’re interested in the technical aspects of how it works. But most people just want to know if they are right.
Was the email you reported actually a threat?
Let’s discuss the feedback you’ll receive when you report an email.
Threat Found
If a threat is found, we’ll notify you via email, and you can give yourself a nice pat on the back.
At this point, no further action is required on your part. We will remove the email from your inbox and from your co-workers’ inboxes to protect the rest of your organization.
If you have any questions, you’re more than welcome to contact our support team.
More and more phishing emails are designed to bypass traditional security tools. Human error and AI-powered attacks mean it’s no longer sufficient to rely solely on these security tools.
No Threat Detected
If no threat is detected, we’ll alert you that our automated system did not identify one. However, that doesn’t mean the email is 100% safe.
Phishing attacks evolve, meaning security software has to evolve with them to catch new and emerging threats. False negatives are possible.
We recommend not trying to locate the email again and proceeding with caution if you decide to do so, without contacting IT support first.
Even though no threat was detected, you still did the right thing. It’s better to be overly cautious than to risk interacting with a malicious email.
Your Employees are Your Best Defense
More and more phishing emails are designed to bypass traditional security tools. Human error and AI-powered attacks mean it’s no longer sufficient to rely solely on these security tools.
But with regular phishing training, organizations large and small can reduce their risk by more than 85% in a year, and that progress compounds over time.
Don’t wait until someone at your organization falls victim to implement phishing training.
If you’re looking to protect your company from cybersecurity threats, contact us to learn how we can help train your employees to spot the telltale signs of a scam.
Stay updated! Get tips and insights delivered to your inbox weekly by subscribing to our newsletter.
