Priority Security Protocol

THINK BEFORE
YOU CLICK

Hackers don’t hack systems. They trick people.

mail
Phase 01

Fake Email

You receive an email that looks real. It may look like it came from your company, bank, or Microsoft.

touch_app
Phase 02

You Click

You click the link and open the page. It asks you to log in.

password
Phase 03

You Enter Your Password

The page looks real, so you enter your email and password.

no_accounts
Phase 04

Account Hacked

But it was a fake page. Now the hacker has your login details.

share_reviews
Phase 05

It Spreads

They log into your email and send messages to your contacts.

Fake Login Pages

Hackers create websites that look exactly like real login pages. They may look like: Microsoft login, Gmail login, Company portal. But they are fake. When you enter your email and password on these pages, you are giving it directly to the hacker. Always check the website before logging in.

Real Site
Official portal interface

Check the URL

The address bar should show the exact official domain with a secure padlock.

Fake Site
Phishing portal interface

Look For Glitches

Spelling errors, pixelated logos, and strange domains like '.net' instead of '.com'.

What Hackers Do Next

mark_email_read
Read Emails

Once they get access, they don’t act immediately. They read your emails to find sensitive info.

groups
See Contacts

They see who you talk to and understand your relationships to craft better tricks.

visibility
Understand Work

They wait quietly, understanding your work patterns to strike at the most vulnerable moment.

How they attack others

Now they use your email to trick others. They send messages like: 'Please check this file', 'Urgent – need your help', 'Click this link'. Since it comes from you, people trust it. They click. Then their accounts also get hacked.

Why this works:

verified People trust emails from people they know
check_circle The message looks normal
warning_off There are no clear warning signs

Stay Safe

  • check

    Don’t click links or files if you are not sure

  • check

    Never enter your email and password on unknown websites

  • check

    Always check the website address before logging in

  • check

    Use strong passwords and don’t reuse them

  • check

    Turn on 2-step verification (OTP)

  • check

    If something feels strange, confirm with the person directly

Hackers don’t break systems.
They trick people.

Protect yourself, your teammates, and your company.