Information Security Team

You clicked a simulated
phishing link.

This was a planned security awareness exercise by the Atidiv Security Team. No real harm has been done — but in a real attack, this click could have compromised your account.

What just happened

The email you received was sent by the Atidiv Security Team as part of a planned phishing simulation. It was carefully designed to look like a real threat.

You are not in trouble. This exercise helps us understand where we need to improve as a company.

What to do right now

1

Don't worry — no data was captured, no systems were accessed. This page is the end of the test.

2

Spot the red flags in that email — see below. Training yourself to notice these keeps you safe everywhere.

3

Read the weekly security flyers — click the button below to view this week's flyer.

4

Next time, report suspicious emails to helpdesk@atidiv.com before clicking anything.

Red flags that were in that email

Sender domain was security-alert.atidiv.com — not the official atidiv.com

Artificial urgency — "suspended at midnight" — designed to make you act fast without thinking

The link URL did not match any expected Atidiv internal tool or login page

No personalisation — it did not address you by name or mention your specific account

"Do not reply to this email" — blocks you from questioning or verifying the sender

See this week's security flyer

Learn to spot the next attack before it lands

For real suspicious emails, always report to

helpdesk@atidiv.com

First flyer 1 of 4 · Phishing
Phishing Awareness

Security Awareness

Phishing Attacks
Are Getting Smarter.
Are You?

Hackers don't hack systems — they hack people. Learn to spot the signs before you click.

Before you click any link or open an attachment, ask yourself:

Does the sender look suspicious?

Check for misspelled domains, unusual senders, or addresses you don't recognise.

Is there urgency or fear?

"Act now!", "Your account will be suspended" — these are pressure tactics. Slow down.

Is it asking for credentials or OTP?

Atidiv will never ask for your password or one-time code via email.

Golden rule: If in doubt, don't click — report it immediately.

Report suspicious emails to

helpdesk@atidiv.com

Atidiv Information Security · Internal use only

2 of 4 · Passwords
Password Hygiene

Your Password
Is the Front Door.
Is It Locked?

Most breaches start with a weak or reused password. Here's how to protect yourself.

81%
of breaches involve weak or stolen passwords
2 sec
to crack "password123" with modern tools

Three steps to protect yourself

01

Use a passphrase — 4 random words beat a complex 8-character password every time.

02

Never reuse passwords — one breach puts all your accounts at risk.

03

Enable MFA — Multi-factor authentication blocks 99% of automated attacks.

Report suspicious activity to

helpdesk@atidiv.com

Atidiv Information Security · Internal use only

3 of 4 · Social Engineering
Social Engineering

Security Awareness

Not Every Threat
Comes From a Screen.

Attackers exploit trust, authority, and urgency — not just technology. Knowing their playbook is your best defence.

Tactics attackers use — recognise these

Impersonation — "This is IT support"

Someone claims to be IT, HR, or a vendor and asks for your OTP. Atidiv IT will never ask for your password or OTP.

Urgency — "Act now or lose access"

Panic-inducing messages are a manipulation tactic. Slow down and verify through official channels first.

Tailgating — "Can you hold the door?"

Always direct unverified visitors to reception — no exceptions, even if they seem familiar.

Always verify through a second channel

Call back on a known number. Check with your manager directly. A real colleague will always understand.

Report suspicious activity to

helpdesk@atidiv.com

Atidiv Information Security · Internal use only

4 of 4 · Safe Browsing Last flyer
Safe Browsing

Security Awareness

The Internet Is a
Minefield. Browse Smart.

One wrong click on a malicious site can expose company data. Here's your quick reference guide.

Do this
Check the URL starts with https:// before entering any data
Use company VPN when working remotely or on public Wi-Fi
Keep your browser and plugins updated at all times
Report suspicious pop-ups or redirects to the helpdesk
Avoid this
Clicking pop-ups that say "Your device is infected!"
Downloading software from unofficial or unknown sources
Using personal email or cloud drives for work files
Ignoring browser security warnings or certificate errors

Report suspicious activity to

helpdesk@atidiv.com

Atidiv Information Security · Internal use only