Which of the following are indications that you could have received a phishing email?
Phishing can involve a variety of approaches, but which is the most common?
If you want to help identify and deal with cyber-attacks, what is the first action you should take?