An email comes in from one of the suppliers at work requesting that you verify the information they have on file. The email contains a link to a website which requests that you enter your username and password in order to procee What may be an appropriate next step?
All Questions › Category: Cyber Security › An email comes in from one of the suppliers at work requesting that you verify the information they have on file. The email contains a link to a website which requests that you enter your username and password in order to procee What may be an appropriate next step?