An employee receives an urgent email from what appears to be the IT department, requesting immediate access to their account credentials to resolve a security issue. The email includes a link to a login page that looks authentic. What is the most appropriate action for the employee to take?
Want adaptive practice that measures your real level?