This was a planned security awareness exercise by the Atidiv Security Team. No real harm has been done — but in a real attack, this click could have compromised your account.
What just happened
The email you received was sent by the Atidiv Security Team as part of a planned phishing simulation. It was carefully designed to look like a real threat.
You are not in trouble. This exercise helps us understand where we need to improve as a company.
What to do right now
Don't worry — no data was captured, no systems were accessed. This page is the end of the test.
Spot the red flags in that email — see below. Training yourself to notice these keeps you safe everywhere.
Read the weekly security flyers — click the button below to view this week's flyer.
Next time, report suspicious emails to helpdesk@atidiv.com before clicking anything.
Red flags that were in that email
Sender domain was security-alert.atidiv.com — not the official atidiv.com
Artificial urgency — "suspended at midnight" — designed to make you act fast without thinking
The link URL did not match any expected Atidiv internal tool or login page
No personalisation — it did not address you by name or mention your specific account
"Do not reply to this email" — blocks you from questioning or verifying the sender
See this week's security flyer
Learn to spot the next attack before it landsFor real suspicious emails, always report to
helpdesk@atidiv.com
Security Awareness
Hackers don't hack systems — they hack people. Learn to spot the signs before you click.
Before you click any link or open an attachment, ask yourself:
Does the sender look suspicious?
Check for misspelled domains, unusual senders, or addresses you don't recognise.
Is there urgency or fear?
"Act now!", "Your account will be suspended" — these are pressure tactics. Slow down.
Is it asking for credentials or OTP?
Atidiv will never ask for your password or one-time code via email.
Golden rule: If in doubt, don't click — report it immediately.
Report suspicious emails to
helpdesk@atidiv.com
Atidiv Information Security · Internal use only
AtidivMost breaches start with a weak or reused password. Here's how to protect yourself.
Three steps to protect yourself
Use a passphrase — 4 random words beat a complex 8-character password every time.
Never reuse passwords — one breach puts all your accounts at risk.
Enable MFA — Multi-factor authentication blocks 99% of automated attacks.
Report suspicious activity to
helpdesk@atidiv.com
Atidiv Information Security · Internal use only
AtidivSecurity Awareness
Attackers exploit trust, authority, and urgency — not just technology. Knowing their playbook is your best defence.
Tactics attackers use — recognise these
Impersonation — "This is IT support"
Someone claims to be IT, HR, or a vendor and asks for your OTP. Atidiv IT will never ask for your password or OTP.
Urgency — "Act now or lose access"
Panic-inducing messages are a manipulation tactic. Slow down and verify through official channels first.
Tailgating — "Can you hold the door?"
Always direct unverified visitors to reception — no exceptions, even if they seem familiar.
Always verify through a second channel
Call back on a known number. Check with your manager directly. A real colleague will always understand.
Report suspicious activity to
helpdesk@atidiv.com
Atidiv Information Security · Internal use only
AtidivSecurity Awareness
One wrong click on a malicious site can expose company data. Here's your quick reference guide.
Report suspicious activity to
helpdesk@atidiv.com
Atidiv Information Security · Internal use only
Atidiv