A Chief Finance Officer receives an email from someone who is possibly impersonating the company’s Chief Executive Officer and requesting a financial operation. Which of the following should an analyst use to verify whether the email is an impersonation attempt?
BadoBully
2 months, 4 weeks ago4a8c1a0
5 months, 1 week ago