A copy/paste-ready staff guide you can send today + a lightweight reporting process
✅ Always: if in doubt, stop and think/ask, better safe than sorry.
✅ Never log in from an email link. Use a bookmark or type the known URL.
✅ If it feels urgent, slow down. Verify in a different channel.
✅ If you get an unexpected MFA prompt, record/screenshot it (if possible), deny it and report it.
✅ If you’re not sure, ask. You won’t get in trouble for checking.
Option A - “Forward + Subject” (easy mode)
PHISH REPORT - [Your name] - [Short reason]Option B - Screenshot + details (when forward is blocked)
| Check | What you’re looking for |
|---|---|
| Sender | Look for slight spelling differences, odd domains, or display-name tricks. |
| Urgency | “Today”, “now”, “account locked”, “last chance”. |
| Links | Hover (don’t click) and check the destination domain. |
| Attachments | Unexpected ZIP/HTML/Office files, “enable macros”, password-protected attachments. |
| Request | Passwords, MFA codes, payments, bank changes, gift cards. |
Copy/paste into email or Teams:
Team - quick reminder: please don’t log in via email links. Use bookmarks for Microsoft 365 and other services.
If you get an unexpected “account locked / shared file / invoice” message, pause and verify before clicking.
If anything looks suspicious, forward it with subject PHISH REPORT (or screenshot it) and let us know. Thanks!
No hard sell - just clarity and practical next steps.
hello@virtusgroup.biz