🚩 Why is this important?

Hackers target people, not just technology. Being aware helps protect you and our entire company from cyber threats.


🚨 How Can You Be Hacked?

Hacking often involves manipulation, human errors, or technical weaknesses. Here are common hacking techniques and how you can protect yourself:


1️⃣ Phishing Emails

Phishing emails are fake messages designed to look legitimate, tricking you into taking harmful actions or revealing sensitive information.

🔹 Example:

You receive an email from:

Hacker: [email protected] (incorrect domain spelling)

Our official domain: palmoutsourcing.com

🔍 Notice the difference:

The hacker’s domain has a misplaced “e”.

Always verify: Copy the sender’s domain and paste it into your browser to check if it redirects to our official website. Carefully check the spelling to ensure the domain exactly matches our official company domain.

How to stay safe:

✔️ Always carefully check sender addresses and spelling.

✔️ Do not click unexpected or suspicious links or download attachments.

✔️ If unsure, forward the email to IT for verification.