During a routine security check, you receive an email that appears to be from the IT department, requesting immediate confirmation of your login credentials for a scheduled system update. The email contains a link to a login page that closely resembles your organization's official portal. What is the most appropriate action to take?
Want adaptive practice that measures your real level?