You are on page 1of 2

Assignment 06

Course title Communication


Course number CPM-230
Report title Data Breach
Name Perarasan Athappampalayam Devaraj
Student id 0788610
Staff in-charge Professor Russel laird
Date 2022-03-24
From,

Perarasan Athappampalayam Devaraj,

Manager,

PVR constructions.

To,

Raymond,

Head of logistics,

Since it developers.

Dear Raymond,

Subject: Regarding phishing email sent to my business email address

I'm writing to let you know that I received a phishing email in my office inbox last night.

Yesterday, after work hours, I received a phishing message to my business email address. The
mail comes from one of the suppliers and it states that they need my signature on a recent order
invoice. So, as requested, I clicked on the provided website, but there was nothing to sign. Then
I ignored the mail and went about my business. However, when I received the company's high
alert warning about these phishing emails today, I instantly remembered that I strongly suspect
yesterday's email was a phishing email, and now I'm concerned that our company's data and
servers may have been hacked as a result of clicking on those links.

I am convinced that phishing emails are a source of fraud in any firm. As a result, I'm requesting
that the IT staff employ modern tools to detect phishing or spam emails. It will be a more clear
and trustworthy strategy to provide the same domain address for suppliers and vendors to contact.
Another option to avoid such complications is to meet in person rather than mailing for signatures.
In any case, Canadian Anti-Spam Legislation protects both consumers and organizations from
the misuse of digital technology, such as spam and threat mail, according to CASL. CASL will
safeguard consumers from internet hackers by requiring commercial electronic messages to be
sent via any means.

I request that the IT department take the appropriate steps to combat this type of phishing email
and assist in protecting the company's database as well as the privacy of its personnel. In addition,
I recommend installing the necessary anti-malware software and blocking the phishing email's IP
address.

Thanks and regards,

Perarasan Athappampalayam Devaraj.

You might also like