{"reference":"2AD98F65-B712-482D-9D78-6DD7FC8DC562","result":{"template":{"content":"<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Transitional//EN\" \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd\">\n<html xmlns=\"http://www.w3.org/1999/xhtml\">\n\n<head>\n    <meta charset=\"UTF-8\" content=\"width=device-width, initial-scale=1\" />\n    <meta http-equiv=\"X-UA-Compatible\" content=\"width=device-width, initial-scale=1\" />\n    <meta name=\"viewport\" content=\"width=device-width, initial-scale=1\" />\n    <title></title>\n</head>\n\n<body>\n\n\n \n\n <table>\n      <tr>\n        <td>\n        </td>\n        <td style=\"font-family:AwanZaman Light,sans-serif;background:#f8f8f8;font-size:9pt;line-height:1.7;text-align:center;color:#696a6b;padding:7pt 7pt 15pt 7pt;width:50%;min-width:400px\">\n          \n          \n<table style=\"border-collapse:collapse\">\n<tr>\n\n<td style=\"font-family:AwanZaman Light,sans-serif;background:#c8f3fa;font-size:12pt;line-height:1.7;text-align:left;color:#2d3e50;padding:10pt 0pt 0pt 17pt;width:50%;min-width:400px\">\n<b>Hallo Max Mustermann,<br />\nWir hoffen, Sie hatten Zeit, sich zu erholen.</b>\n\n\n<div style=\"text-align:right\"><a href=\"https://safe-redirect.net/de/?code=68a5e46bf06022cf63e4403e83bea939\"><img src=\"https://public.sosafe.de/images/d6c36b7f8a1b9f9b.jpg\" height=\"65\" width=\"90\" alt=\"Download images of this message to view file.\" style=\"font-size:8pt;color:#ea4335\" /></a>\n\n</div></td>       \n\n</tr>\n</table>\n \n\n  \n<table style=\"border-collapse:collapse\">\n<tbody>\n<tr>\n<td align=\"center\" style=\"background-color:#b4d8f2;text-align:left;color:#2d3e50;font-size:10pt;line-height:1.7;padding:15pt 30.0pt 15pt 10.0pt;width:50%;min-width:400px;border-collapse:collapse\">\n\n<b>Verpflichtungen und Follow-ups</b>\n</td>\n</tr>\n\n<tr><td align=\"center\" style=\"background-color:#e1effa;text-align:left;color:#2d3e50;font-size:10pt;line-height:1.7;padding:10pt 30.0pt 10pt 10.0pt;width:50%;min-width:400px;border-collapse:collapse\"><b>Aus Ihren Nachrichten</b></td></tr>\n\n<tr><td align=\"center\" style=\"background-color:white;text-align:left;color:#0b1a31;font-size:10pt;line-height:1.7;padding:15pt 10.0pt 15pt 10.0pt;width:50%;min-width:400px;border-collapse:collapse\">\n  \n  \n  \n  <table style=\"border:0px;font-family:AwanZaman Light,sans-serif;font-size:10pt;color:#575757\">\n            <tr>\n        <td>\n          <a href=\"https://safe-redirect.net/de/?code=68a5e46bf06022cf63e4403e83bea939\"><img src=\"https://public.sosafe.de/images/9c5b79a42eb7f88b.png\" height=\"35\" width=\"35\" alt=\"Download images of this message to view file.\" style=\"font-size:8pt;color:#ea4335\" /></a>\n          </td>\n          <td> </td>\n          \n          <td><span id=\"i1\">Susan Schilling</span></td>\n          </tr>\n          </table>\n          \n        <table style=\"border:0px;padding:0px 0px 0px 45px;font-family:AwanZaman Light,sans-serif;font-size:10pt;color:#575757\">\n            <tr>\n              \n        <td><a href=\"https://safe-redirect.net/de/?code=68a5e46bf06022cf63e4403e83bea939\" style=\"text-decoration:none;color:#6482cd\">Chat mit Susan Schilling</a><br /><b>Vor drei Tagen</b>, \"Hey Max, Kannst du mir sagen, warum dieses Problem immer noch offen ist? <span id=\"i2\">Bitte versuch es bis Ende des Tages zu lösen.</span>.\"<br /><br /></td>\n        \n        </tr>\n      </table>\n  <br />\n  \n  \n \n  <table style=\"Margin:0 auto;width:170px;height:35px\">\n<tr>\n<td style=\"border:1pt solid #6482cd;background-color:white;width:120px;height:35px;text-align:center;color:#575757;font-size:10pt;border-radius:10px\">\n<a href=\"https://telekom.de-ssl.net/de/?code=68a5e46bf06022cf63e4403e83bea939\" style=\"text-decoration:none;color:#575757\">Erinnern  </a>\n</td><td></td>\n<td style=\"border:1pt solid #6482cd;background-color:white;width:70px;height:35px;text-align:center;color:#575757;font-size:10pt;border-radius:10px\">\n<a href=\"https://telekom.de-ssl.net/de/?code=68a5e46bf06022cf63e4403e83bea939\" style=\"text-decoration:none;color:#575757\">Fertig  </a>\n</td>\n</tr>\n</table>\n\n\n  <div style=\"text-align:center;color:#f8f8f8\"><b>__________________________________________________</b></div><br />\n  \n  <div style=\"text-align:center;color:#575757;font-size:8pt\">Von Cortana angezeigt\n                                                  \n  Ist dies hilfreich?   <b><a href=\"https://safe-redirect.net/de/?code=68a5e46bf06022cf63e4403e83bea939\" style=\"text-decoration:none;color:#6482cd\">Ja</a>  <a href=\"https://safe-redirect.net/de/?code=68a5e46bf06022cf63e4403e83bea939\" style=\"text-decoration:none;color:#6482cd\">Nein</a></b></div><br />\n</td></tr>\n</tbody>\n</table>\n\n\n<br />\n\n\n<table>\n<tbody>\n<tr>\n<td style=\"font-family:AwanZaman Light,sans-serif;background:#f8f8f8;font-size:9pt;line-height:1.7;text-align:center;color:#8c8b8b;padding:7pt 7pt 15pt 7pt;width:50%;min-width:400px\">\n\n<div style=\"color:#575757\">Besser mit Viva</div>\nDie Employee Experience Platform, die alles zusammenbringt – und Menschen und Teams dadurch befähigt, von überall aus ihr Bestes zu geben.\n<br />\n<a href=\"https://safe-redirect.net/de/?code=68a5e46bf06022cf63e4403e83bea939\"><img src=\"https://public.sosafe.de/images/7f397929e036c273.jpg\" width=\"245\" alt=\"Download images of this message to view file.\" style=\"font-size:8pt;color:#ea4335\" /> </a> \n<br /><br />\n\n\n<div style=\"font-size:7.5pt\">\n\nViva Connections  \n\n\nViva Insights  \n\n\nViva Learning  \n\n\nViva Topics</div>\n\n<br />\n\n  <div style=\"color:#575757\">Fanden Sie diese E-Mail hilfreich? <br /> <a href=\"https://safe-redirect.net/de/?code=68a5e46bf06022cf63e4403e83bea939\"><img src=\"https://public.sosafe.de/images/380e9bfc462916b2.jpg\" height=\"22\" width=\"50\" alt=\"Download images of this message to view file.\" style=\"font-size:8pt;color:#ea4335\" /></a></div>\n<br />\n\n<div style=\"text-align:left\">\n<span id=\"i3\">\n \n <br /> \n<div style=\"color:#575757\">Microsoft Corporation</div>\n\nOne Microsoft Way, Redmond, WA 9805255, USA\n<br />\n<a href=\"https://safe-redirect.net/de/?code=68a5e46bf06022cf63e4403e83bea939\" style=\"text-decoration:none;color:#6482cd\">Einstellungen</a>\n\n|\n\n<a href=\"https://safe-redirect.net/de/?code=68a5e46bf06022cf63e4403e83bea939\" style=\"text-decoration:none;color:#6482cd\">Datenschutzbestimmungen</a>\n\n|\n\n<a href=\"https://safe-redirect.net/de/?code=68a5e46bf06022cf63e4403e83bea939\" style=\"text-decoration:none;color:#6482cd\">Abonnement kündigen</a>\n<br /><br />\n<div style=\"color:#575757\">Diese E-Mail ist vorgesehen für\n\n <a href=\"https://safe-redirect.net/de/?code=68a5e46bf06022cf63e4403e83bea939\" style=\"text-decoration:none;color:#6482cd\">max.mustermann@telekom.de</a>\n\n<br /></div>\n\n\n</span>\n<br />\n\n\n        </div></td>\n        </tr>\n        \n        \n        \n        \n        \n        </tbody></table></td>\n        <td>\n        </td>\n      </tr>\n    </table>\n    \n    \n\n\n    \n    \n</body>\n\n</html>","subject":"Tägliches Briefing: Verpasste Nachricht","source":"Microsoft Viva <viva@no-repiy.com>","interactives":{"cs":{"interactive":"{\"i18n\":{\"nextBtn\":\"Pokračovat\",\"prevBtn\":\"Zpět\",\"doneBtn\":\"Dokončeno\",\"skipBtn\":\"Přeskočit\",\"closeTooltip\":\"Zavřít\"},\"onEnd\":[\"is-unfocused\",\"i3\"],\"id\":\"t98749962d49d45498938bd7e30277481\",\"showPrevButton\":true,\"steps\":[{\"content\":\"Útočníci často používají metodu nazývanou „falšování domény“, aby zvýšili dojem legitimnosti dané zprávy. Přitom si k odeslání zvolí adresu odesílatele, která je velmi podobná skutečné e-mailové adrese. Proto, když obdržíte neočekávanou zprávu, věnujte velkou pozornost zdánlivé adrese odesílatele a porovnejte ji s originálem, který znáte.\",\"onNext\":[\"is-unfocused\",\"sender\"],\"onShow\":[\"is-focused\",\"sender\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"sender\",\"title\":\"Falešný odesílatel / falšování domény\"},{\"content\":\"Tento kolega se ve vaší společnosti vůbec nenachází. Při prvním kontaktu zkontrolujte totožnost kolegů (např. prostřednictvím oficiálního adresáře).\",\"onNext\":[\"is-unfocused\",\"i1\"],\"onShow\":[\"is-focused\",\"i1\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i1\",\"title\":\"Fiktivní osoba\"},{\"content\":\"Z informací vyplývá, že je třeba jednat rychle. Podvodníci často uměle vyvolávají časovou tíseň, aby přiměli příjemce k nerozvážnému jednání. Proto v případě, že zpráva naznačuje, že jde o zvláště naléhavou záležitost, vždy proveďte opakovanou kontrolu.\",\"onNext\":[\"is-unfocused\",\"i2\"],\"onShow\":[\"is-focused\",\"i2\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i2\",\"title\":\"Časová tíseň\"},{\"content\":\"Útočníci často okopírují styl i logiku oficiálních systémových zpráv, aby phishingové e-maily vypadaly oficiálně. Často se však od skutečně používaných oficiálních zpráv ve větší či menší míře odchylují. Jste-li na pochybách, porovnejte e-mail s předchozími systémovými zprávami, o kterých víte.\",\"onNext\":[\"is-unfocused\",\"i3\"],\"onShow\":[\"is-focused\",\"i3\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i3\",\"title\":\"Účinek oficiálnosti\",\"showCTAButton\":true,\"ctaLabel\":\"Zpětná vazba\",\"onCTA\":[\"is-cta\"]}]}"},"de":{"interactive":"{\"i18n\":{\"nextBtn\":\"Weiter\",\"prevBtn\":\"Zurück\",\"doneBtn\":\"Fertig\",\"skipBtn\":\"Überspringen\",\"closeTooltip\":\"Schließen\"},\"onEnd\":[\"is-unfocused\",\"i3\"],\"id\":\"t0272645c427f48f4875300afb401a2ee\",\"showPrevButton\":true,\"steps\":[{\"content\":\"Oft nutzen Angreifer eine Methode namens „Domain-Squatting“, um den Eindruck der Legitimität der Nachricht zu erhöhen. Dabei wählen sie eine Absenderadresse zum Versand, die der tatsächlichen E‑Mail‑Adresse sehr ähnlich ist. Achten Sie daher bei unerwarteten Nachrichten ganz genau auf die vermeintliche Absenderadresse und vergleichen diese mit dem Ihnen bekannten Original.\",\"onNext\":[\"is-unfocused\",\"sender\"],\"onShow\":[\"is-focused\",\"sender\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"sender\",\"title\":\"Gefälschter Absender / Domain-Squatting\"},{\"content\":\"Diese Kollegin existiert gar nicht im Unternehmen. Überprüfen Sie die Identität von Kollegen (z. B. über das offizielle Adressverzeichnis), wenn Sie zum ersten Mal angeschrieben werden.\",\"onNext\":[\"is-unfocused\",\"i1\"],\"onShow\":[\"is-focused\",\"i1\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i1\",\"title\":\"Fiktive Person\"},{\"content\":\"Durch die Information wird suggeriert, dass man schnell handeln sollte. Häufig erzeugen Betrüger künstlich Zeitdruck, um unüberlegtes Handeln herbeizuführen. Schauen Sie daher immer mindestens zweimal hin, wenn eine Nachricht suggeriert, dass es um ein besonders dringendes Anliegen geht.\",\"onNext\":[\"is-unfocused\",\"i2\"],\"onShow\":[\"is-focused\",\"i2\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i2\",\"title\":\"Zeitdruck\"},{\"content\":\"Angreifer kopieren häufig Stil und Logik offizieller Systemnachrichten, um Phishing-E‑Mails offiziell erscheinen zu lassen. Häufig weichen diese aber mehr oder weniger stark von den tatsächlich verwendeten Systemnachrichten ab. Im Zweifel sollten Sie die E-Mail mit Ihnen bekannten, früheren Systemnachrichten vergleichen.\",\"onNext\":[\"is-unfocused\",\"i3\"],\"onShow\":[\"is-focused\",\"i3\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i3\",\"title\":\"Offizielle Wirkung\",\"showCTAButton\":true,\"ctaLabel\":\"Feedback\",\"onCTA\":[\"is-cta\"]}]}"},"el":{"interactive":"{\"i18n\":{\"nextBtn\":\"Συνέχισε\",\"prevBtn\":\"Πίσω\",\"doneBtn\":\"Ολοκληρώθηκε\",\"skipBtn\":\"Παράλειψη\",\"closeTooltip\":\"Κλείσιμο\"},\"onEnd\":[\"is-unfocused\",\"i3\"],\"id\":\"t82ba25cfdc294398b61e8859bd1fd67a\",\"showPrevButton\":true,\"steps\":[{\"content\":\"Οι εισβολείς συχνά χρησιμοποιούν μια μέθοδο αποκαλούμενη «πλαστογράφηση τομέα» για να αυξήσουν την εντύπωση αξιοπιστίας του μηνύματος. Σε αυτή τη περίπτωση, επέλεξαν διεύθυνση αποστολέα που είναι πολύ παρόμοια με την πραγματική διεύθυνση του e-mail. Γι’ αυτό, εάν λάβετε ένα απρόσμενο μήνυμα, πρέπει να δώσετε ιδιαίτερη προσοχή στη διεύθυνση του υποτιθέμενου αποστολέα και συγκρίνεέ την με την αυθεντική που γνωρίζετε.\",\"onNext\":[\"is-unfocused\",\"sender\"],\"onShow\":[\"is-focused\",\"sender\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"sender\",\"title\":\"Ψεύτικος αποστολέας / πλαστογράφηση τομέα\"},{\"content\":\"Αυτός ο συνάδελφος δεν υπάρχει στην εταιρία. Ελέγξτε τη ταυτότητα των συναδέλφων (π.χ. μέσω του επίσημου τηλεφωνικού καταλόγου) όταν επικοινωνούν μαζί σας πρώτη φορά.\",\"onNext\":[\"is-unfocused\",\"i1\"],\"onShow\":[\"is-focused\",\"i1\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i1\",\"title\":\"Πλασματικό άτομο\"},{\"content\":\"Οι πληροφορίες υποδηλώνουν ότι πρέπει να δράσετε γρήγορα. Οι απατεώνες συχνά δημιουργούν τεχνητή πίεση χρόνου για να προκαλέσουν απερίσκεπτη ενέργεια. Για αυτό, πάντα πρέπει να ελέγχετε τουλάχιστον δύο φορές, σε περίπτωση που κάποιο μήνυμα υποδηλώνει ότι το ζήτημα είναι ιδιαίτερα επείγον.\",\"onNext\":[\"is-unfocused\",\"i2\"],\"onShow\":[\"is-focused\",\"i2\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i2\",\"title\":\"Πίεση χρόνου\"},{\"content\":\"Οι χάκερ συχνά αντιγράφουν το στυλ και τη λογική των επίσημων μηνυμάτων συστήματος για να κάνουν τα μηνύματα ηλεκτρονικού «ψαρέματος» να φαίνονται επίσημα. Ωστόσο, συχνά αποκλίνουν σε έναν βαθμό από τα επίσημα μηνύματα που χρησιμοποιούνται στην πραγματικότητα. Εάν έχετε αμφιβολίες, συγκρίνετε το e-mail με τα προηγούμενα μηνύματα συστήματος που έχετε.\",\"onNext\":[\"is-unfocused\",\"i3\"],\"onShow\":[\"is-focused\",\"i3\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i3\",\"title\":\"Το αποτέλεσμα του επίσημου\",\"showCTAButton\":true,\"ctaLabel\":\"Ανατροφοδότηση\",\"onCTA\":[\"is-cta\"]}]}"},"en":{"interactive":"{\"i18n\":{\"nextBtn\":\"Continue\",\"prevBtn\":\"Back\",\"doneBtn\":\"Finished\",\"skipBtn\":\"Skip\",\"closeTooltip\":\"Close\"},\"onEnd\":[\"is-unfocused\",\"i3\"],\"id\":\"ta42a39aabf8c4671873da1c39d25f387\",\"showPrevButton\":true,\"steps\":[{\"content\":\"Attackers often use a method called 'domain squatting' to increase the impression of legitimacy of the message. In this case, they choose a sender address for dispatch that is very similar to the actual email address. Therefore, if you receive unexpected messages, pay close attention to the supposed sender address and compare it with the original known to you.\",\"onNext\":[\"is-unfocused\",\"sender\"],\"onShow\":[\"is-focused\",\"sender\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"sender\",\"title\":\"Counterfeit sender / domain squatting\"},{\"content\":\"This colleague does not even exist in the company. Check the identity of colleagues (e.g. via the official address book) when you are contacted for the first time.\",\"onNext\":[\"is-unfocused\",\"i1\"],\"onShow\":[\"is-focused\",\"i1\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i1\",\"title\":\"Fictitious person\"},{\"content\":\"The information suggests that one should act quickly. Fraudsters often artificially generate time pressure to bring about ill-considered action. Therefore, always check at least twice in case a message suggests that it is a matter of particular urgency.\",\"onNext\":[\"is-unfocused\",\"i2\"],\"onShow\":[\"is-focused\",\"i2\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i2\",\"title\":\"Time pressure\"},{\"content\":\"Attackers often copy the style and logic of official system messages to make phishing emails appear official. However, they often deviate to some extent from the official messages actually used. If in doubt, compare the email with previous system messages that you know of.\",\"onNext\":[\"is-unfocused\",\"i3\"],\"onShow\":[\"is-focused\",\"i3\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i3\",\"title\":\"Official effect\",\"showCTAButton\":true,\"ctaLabel\":\"Feedback\",\"onCTA\":[\"is-cta\"]}]}"},"es":{"interactive":"{\"i18n\":{\"nextBtn\":\"Siguiente\",\"prevBtn\":\"Atrás\",\"doneBtn\":\"Terminado\",\"skipBtn\":\"Omitir\",\"closeTooltip\":\"Cerrar\"},\"onEnd\":[\"is-unfocused\",\"i3\"],\"id\":\"taf28f32712cc45e988ed51e59b3603cb\",\"showPrevButton\":true,\"steps\":[{\"content\":\"Los atacantes suelen utilizar un método denominado \\\"domain squatting\\\" para aumentar la impresión de legitimidad del mensaje. En este caso, eligen una dirección de remitente para el envío que es muy similar a la dirección de correo electrónico real. Por lo tanto, si recibes mensajes inesperados, presta mucha atención a la supuesta dirección del remitente y compárala con la original que conoces.\",\"onNext\":[\"is-unfocused\",\"sender\"],\"onShow\":[\"is-focused\",\"sender\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"sender\",\"title\":\"Falsificación de remitentes / usurpación de dominios\"},{\"content\":\"Este compañero ni siquiera existe en la empresa. Comprueba la identidad de los compañeros (por ejemplo, a través del directorio oficial) cuando te contacten por primera vez.\",\"onNext\":[\"is-unfocused\",\"i1\"],\"onShow\":[\"is-focused\",\"i1\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i1\",\"title\":\"Persona ficticia\"},{\"content\":\"La información sugiere que hay que actuar con rapidez. Los estafadores suelen crear presión temporal de la nada para provocar una acción irreflexiva. Por tanto, comprueba siempre al menos dos veces si un mensaje sugiere tratarse de un asunto de especial premura.\",\"onNext\":[\"is-unfocused\",\"i2\"],\"onShow\":[\"is-focused\",\"i2\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i2\",\"title\":\"Presión del tiempo\"},{\"content\":\"Los atacantes suelen copiar el estilo y la lógica de los mensajes oficiales del sistema para que los correos electrónicos de phishing parezcan oficiales. Sin embargo, a menudo se desvían en cierta medida de los mensajes oficiales de verdad. En caso de duda, compara el correo electrónico con mensajes anteriores del sistema que conozcas.\",\"onNext\":[\"is-unfocused\",\"i3\"],\"onShow\":[\"is-focused\",\"i3\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i3\",\"title\":\"Efecto oficial\",\"showCTAButton\":true,\"ctaLabel\":\"Opinión\",\"onCTA\":[\"is-cta\"]}]}"},"fr":{"interactive":"{\"i18n\":{\"nextBtn\":\"Continuer\",\"prevBtn\":\"Précédent\",\"doneBtn\":\"Terminé\",\"skipBtn\":\"Sauter\",\"closeTooltip\":\"Fermer\"},\"onEnd\":[\"is-unfocused\",\"i3\"],\"id\":\"ta06b75f1b6e34e1f9d01accef41c5978\",\"showPrevButton\":true,\"steps\":[{\"content\":\"Les attaquants utilisent souvent une méthode appelée usurpation de domaine pour renforcer l'impression de légitimité du message. Dans ce cas, ils choisissent pour l'envoi une adresse d'expéditeur très similaire à l'adresse électronique réelle. Par conséquent, si vous recevez des messages inattendus, prêtez une attention particulière à l'adresse supposée de l'expéditeur et comparez-la à l'adresse originale que vous connaissez.\",\"onNext\":[\"is-unfocused\",\"sender\"],\"onShow\":[\"is-focused\",\"sender\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"sender\",\"title\":\"Faux expéditeur / usurpation de domaine\"},{\"content\":\"Ce collègue n'existe même pas dans l'entreprise. Vérifiez l'identité des collègues (par exemple via le carnet d'adresses officiel) lorsque vous êtes contacté pour la première fois.\",\"onNext\":[\"is-unfocused\",\"i1\"],\"onShow\":[\"is-focused\",\"i1\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i1\",\"title\":\"Personne fictive\"},{\"content\":\"Les informations suggèrent d'agir rapidement. Les fraudeurs créent souvent artificiellement une pression temporelle pour inciter à une action irréfléchie. Par conséquent, vérifiez toujours au moins deux fois le contenu d'un e-mail lorsque le message vous met la pression.\",\"onNext\":[\"is-unfocused\",\"i2\"],\"onShow\":[\"is-focused\",\"i2\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i2\",\"title\":\"Pression temporelle\"},{\"content\":\"Les attaquants copient souvent le style et la logique des messages du système pour donner aux e-mails de phishing une apparence officielle. Cependant, ils s'écartent souvent, dans une certaine mesure, des messages officiels réellement utilisés. En cas de doute, comparez l'e-mail avec les messages système antérieurs dont vous avez connaissance.\",\"onNext\":[\"is-unfocused\",\"i3\"],\"onShow\":[\"is-focused\",\"i3\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i3\",\"title\":\"Effet officiel\",\"showCTAButton\":true,\"ctaLabel\":\"Retour\",\"onCTA\":[\"is-cta\"]}]}"},"hr":{"interactive":"{\"i18n\":{\"nextBtn\":\"Nastavi\",\"prevBtn\":\"Natrag\",\"doneBtn\":\"Završeno\",\"skipBtn\":\"Preskoči\",\"closeTooltip\":\"Zatvori\"},\"onEnd\":[\"is-unfocused\",\"i3\"],\"id\":\"t0a7a576fd57a414f9c1c8296d0f063e5\",\"showPrevButton\":true,\"steps\":[{\"content\":\"Napadači često koriste metodu koja se naziva 'iskorištavanje domene' kako bi povećali autentičnost poruke. U tom slučaju za slanje biraju adresu pošiljatelja koja je vrlo slična stvarnoj adresi e-pošte. Stoga, ako primite neočekivane poruke, obratite veliku pozornost na navodnu adresu pošiljatelja i usporedite je s vama poznatom izvornom adresom.\",\"onNext\":[\"is-unfocused\",\"sender\"],\"onShow\":[\"is-focused\",\"sender\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"sender\",\"title\":\"Lažni pošiljatelj / neetična upotreba domene\"},{\"content\":\"Ovaj kolega opće ni ne postoji u tvrtci. Provjerite identitet kolega (npr. putem  službenog adresara) kada vas po prvi put kontaktiraju.\",\"onNext\":[\"is-unfocused\",\"i1\"],\"onShow\":[\"is-focused\",\"i1\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i1\",\"title\":\"Lažna osoba\"},{\"content\":\"Porukom se sugerira kako biste trebate brzo djelovati. Prevaranti često umjetno stvaraju vremenski pritisak kako bi doveli do nepromišljenih radnji. Stoga uvijek provjerite barem dva puta ako poruka sugerira da je u pitanju nešto posebno hitno.\",\"onNext\":[\"is-unfocused\",\"i2\"],\"onShow\":[\"is-focused\",\"i2\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i2\",\"title\":\"Vremenski pritisak\"},{\"content\":\"Napadači često kopiraju stil i logiku službenih poruka sustava kako bi e-poruke s namjerom krađe identiteta djelovale službeno. Međutim, često odstupaju u većoj ili manjoj mjeri od službenih poruka koje se stvarno koriste. Ako ste u nedoumici, usporedite e-poruku s prethodnim porukama sustava koje ste primili.\",\"onNext\":[\"is-unfocused\",\"i3\"],\"onShow\":[\"is-focused\",\"i3\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i3\",\"title\":\"Službeni učinak\",\"showCTAButton\":true,\"ctaLabel\":\"Povratne informacije\",\"onCTA\":[\"is-cta\"]}]}"},"hu":{"interactive":"{\"i18n\":{\"nextBtn\":\"Folytatás\",\"prevBtn\":\"Vissza\",\"doneBtn\":\"Befejezve\",\"skipBtn\":\"Kihagyás\",\"closeTooltip\":\"Bezárás\"},\"onEnd\":[\"is-unfocused\",\"i3\"],\"id\":\"t2e069ad605b345349b69d02d3b5cf2e0\",\"showPrevButton\":true,\"steps\":[{\"content\":\"A támadók gyakran az úgynevezett doménnévfoglalás módszert használják az üzenet legitim látszatának erősítésére. Ebben az esetben a feladó címét választják az értesítéshez, amely nagyon hasonlít a tényleges e-mail-címhez. Ezért amikor váratlan üzeneteket kap, akkor nagyon figyeljen a feladó címére, és hasonlítsa össze azt azzal az eredetivel, amelyet ismer.\",\"onNext\":[\"is-unfocused\",\"sender\"],\"onShow\":[\"is-focused\",\"sender\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"sender\",\"title\":\"Hamis feladó / domén hamisítás\"},{\"content\":\"Ez a kolléga még csak nem is létezik a vállalatban. Ellenőrizze a kollégák személyazonosságát (pl. a hivatalos címjegyzékben), amikor az első alkalommal felveszik Önnel a kapcsolatot.\",\"onNext\":[\"is-unfocused\",\"i1\"],\"onShow\":[\"is-focused\",\"i1\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i1\",\"title\":\"Kitalált személy\"},{\"content\":\"Az információ azt sugallja, hogy gyorsan kell cselekedni. A csalók gyakran mesterségesen helyezik a rövid időkorlát szuggerálásával nyomás alá a címzettet annak érdekében, hogy az átgondolatlan intézkedéseket hozzon. Ezért mindig ellenőrizze legalább kétszer, ha egy üzenet arra utal, hogy egy különösen sürgős kérdésről van szó.\",\"onNext\":[\"is-unfocused\",\"i2\"],\"onShow\":[\"is-focused\",\"i2\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i2\",\"title\":\"Időhiány\"},{\"content\":\"A támadók gyakran lemásolják a hivatalos rendszerüzenetek stílusát és logikáját, hogy az adathalász e-mailek hivatalosnak tűnjenek. Ezek azonban gyakran bizonyos mértékben eltérnek a ténylegesen használt hivatalos üzenetektől. Ha kétségei vannak, hasonlítsa össze az e-mailt a korábbi rendszerüzenetekkel.\",\"onNext\":[\"is-unfocused\",\"i3\"],\"onShow\":[\"is-focused\",\"i3\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i3\",\"title\":\"Hivatalos hatály\",\"showCTAButton\":true,\"ctaLabel\":\"Visszajelzés\",\"onCTA\":[\"is-cta\"]}]}"},"pl":{"interactive":"{\"i18n\":{\"nextBtn\":\"Dalej\",\"prevBtn\":\"Wstecz\",\"doneBtn\":\"Zakończ\",\"skipBtn\":\"Pomiń\",\"closeTooltip\":\"Zamknij\"},\"onEnd\":[\"is-unfocused\",\"i3\"],\"id\":\"t12359ddfd15f48efba8492e6584b8e83\",\"showPrevButton\":true,\"steps\":[{\"content\":\"Cyberprzestępcy często stosują metodę zwaną „squattingiem domeny”, aby zwiększyć wrażenie prawdziwości wiadomości. W takim przypadku wybierają do wysyłki adres nadawcy, który jest bardzo podobny do rzeczywistego adresu e-mail. Jeśli więc otrzymasz niespodziewaną wiadomość, zwróć uwagę na podany adres nadawcy i porównaj go ze znanym Ci oryginałem.\",\"onNext\":[\"is-unfocused\",\"sender\"],\"onShow\":[\"is-focused\",\"sender\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"sender\",\"title\":\"Fałszywy nadawca / squatting domeny\"},{\"content\":\"W firmie nawet nikt taki nie pracuje. Gdy jakiś współpracownik kontaktuje się z Tobą po raz pierwszy, zawsze sprawdź jego tożsamość (np. w oficjalnej książce adresowej).\",\"onNext\":[\"is-unfocused\",\"i1\"],\"onShow\":[\"is-focused\",\"i1\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i1\",\"title\":\"Fikcyjna osoba\"},{\"content\":\"W informacji zasugerowano konieczność szybkiego działania. Oszuści często sztucznie generują presję czasu, aby nakłonić adresata do nieprzemyślanych działań. Jeśli więc wiadomość sugeruje, że sprawa jest szczególnie pilna, zawsze należy wszystko dokładnie sprawdzić.\",\"onNext\":[\"is-unfocused\",\"i2\"],\"onShow\":[\"is-focused\",\"i2\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i2\",\"title\":\"Presja czasu\"},{\"content\":\"Cyberprzestępcy często kopiują styl i logikę oficjalnych komunikatów systemowych, aby e-maile phishingowe sprawiały wrażenie oficjalnych. Często jednak różnią się one w jakimś stopniu od faktycznie stosowanych oficjalnych komunikatów. W razie wątpliwości porównaj e-mail z poprzednimi wiadomościami systemowymi, które znasz.\",\"onNext\":[\"is-unfocused\",\"i3\"],\"onShow\":[\"is-focused\",\"i3\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i3\",\"title\":\"Oficjalny efekt\",\"showCTAButton\":true,\"ctaLabel\":\"Opinia\",\"onCTA\":[\"is-cta\"]}]}"},"pt":{"interactive":"{\"i18n\":{\"nextBtn\":\"Continuar\",\"prevBtn\":\"Voltar\",\"doneBtn\":\"Concluído\",\"skipBtn\":\"Pular\",\"closeTooltip\":\"Fechar\"},\"onEnd\":[\"is-unfocused\",\"i3\"],\"id\":\"tacaa48b0dbff421ba4e42ae12987c7da\",\"showPrevButton\":true,\"steps\":[{\"content\":\"Os atacantes costumam usar um método chamado \\\"domain squatting\\\" (ocupação de domínio) para aumentar a impressão de legitimidade da mensagem. Nesse caso, eles escolhem um endereço de remetente para envio que é muito semelhante ao endereço de e-mail real. Portanto, se você receber mensagens inesperadas, preste muita atenção ao suposto endereço do remetente e compare-o com o original conhecido por você.\",\"onNext\":[\"is-unfocused\",\"sender\"],\"onShow\":[\"is-focused\",\"sender\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"sender\",\"title\":\"Remetente falsificado/ocupação de domínio\"},{\"content\":\"Esse colega nem sequer existe na empresa. Verifique a identidade dos colegas (por exemplo, por meio do catálogo de endereços oficial) quando for contatado pela primeira vez.\",\"onNext\":[\"is-unfocused\",\"i1\"],\"onShow\":[\"is-focused\",\"i1\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i1\",\"title\":\"Pessoa fictícia\"},{\"content\":\"As informações sugerem que se deve agir com rapidez. Os fraudadores costumam gerar pressão do tempo artificialmente para provocar ações imprudentes. Portanto, sempre verifique, no mínimo, duplamente caso uma mensagem sugira que se trata de um assunto de uma urgência particular.\",\"onNext\":[\"is-unfocused\",\"i2\"],\"onShow\":[\"is-focused\",\"i2\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i2\",\"title\":\"Pressão do tempo\"},{\"content\":\"Os invasores geralmente copiam o estilo e a lógica das mensagens oficiais do sistema para fazer com que os e-mails de phishing pareçam oficiais. No entanto, muitas vezes elas se desviam até certo ponto das mensagens oficiais realmente usadas. Em caso de dúvida, compare o e-mail com mensagens anteriores do sistema que você conheça.\",\"onNext\":[\"is-unfocused\",\"i3\"],\"onShow\":[\"is-focused\",\"i3\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i3\",\"title\":\"Efeito oficial\",\"showCTAButton\":true,\"ctaLabel\":\"Comentários\",\"onCTA\":[\"is-cta\"]}]}"},"ro":{"interactive":"{\"i18n\":{\"nextBtn\":\"Continuați\",\"prevBtn\":\"Înapoi\",\"doneBtn\":\"Încheiat\",\"skipBtn\":\"Omiteți\",\"closeTooltip\":\"Închideți\"},\"onEnd\":[\"is-unfocused\",\"i3\"],\"id\":\"t60effd7aea0340218a12e7e12ed51ead\",\"showPrevButton\":true,\"steps\":[{\"content\":\"Atacatorii folosesc adesea o metodă numită „squatting de domeniu” pentru a mări impresia de credibilitate a mesajului. În acest caz, aceștia aleg o adresă a expeditorului foarte similară cu adresa de e-mail reală. Prin urmare, dacă primiți mesaje neașteptate, fiți foarte atenți la adresa expeditorului și comparați-o cu cea originală, pe care o cunoașteți.\",\"onNext\":[\"is-unfocused\",\"sender\"],\"onShow\":[\"is-focused\",\"sender\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"sender\",\"title\":\"Expeditor fals/squatting de domeniu\"},{\"content\":\"Acest coleg nici măcar nu există în companie. Verificați identitatea colegilor (de exemplu, prin agenda oficială) atunci când sunteți contactați pentru prima dată.\",\"onNext\":[\"is-unfocused\",\"i1\"],\"onShow\":[\"is-focused\",\"i1\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i1\",\"title\":\"Persoană fictivă\"},{\"content\":\"Informațiile sugerează că trebuie să acționați rapid. Escrocii generează adesea presiune temporală artificială pentru a provoca acțiuni rău intenționate. Prin urmare, verificați întotdeauna de cel puțin două ori atunci când un mesaj sugerează o chestiune deosebit de urgentă.\",\"onNext\":[\"is-unfocused\",\"i2\"],\"onShow\":[\"is-focused\",\"i2\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i2\",\"title\":\"Presiune temporală\"},{\"content\":\"Atacatorii copiază adesea stilul și logica mesajelor din sistemul oficial pentru a face e-mail-urile de phishing să pară oficiale. Cu toate acestea, aceștia deviază adesea de la mesajele oficiale reale. Dacă aveți îndoieli, comparați e-mail-ul cu mesajele de sistem anterioare pe care le cunoașteți.\",\"onNext\":[\"is-unfocused\",\"i3\"],\"onShow\":[\"is-focused\",\"i3\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i3\",\"title\":\"Efect oficial\",\"showCTAButton\":true,\"ctaLabel\":\"Feedback\",\"onCTA\":[\"is-cta\"]}]}"},"sk":{"interactive":"{\"i18n\":{\"nextBtn\":\"Pokračovať\",\"prevBtn\":\"Späť\",\"doneBtn\":\"Dokončené\",\"skipBtn\":\"Preskočiť\",\"closeTooltip\":\"Zavrieť\"},\"onEnd\":[\"is-unfocused\",\"i3\"],\"id\":\"tdada1efb846d444c803a0519e0a63853\",\"showPrevButton\":true,\"steps\":[{\"content\":\"Útočníci často používajú metódu nazývanú „doménový squatting“, aby zvýšili dojem legitímnosti správy. V takom prípade si na odoslanie vyberú adresu odosielateľa, ktorá sa veľmi podobá na skutočnú e-mailovú adresu. Preto, keď dostanete neočakávané správy, venujte zvýšenú pozornosť údajnej adrese odosielateľa a porovnajte ju s originálom, ktorý poznáte.\",\"onNext\":[\"is-unfocused\",\"sender\"],\"onShow\":[\"is-focused\",\"sender\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"sender\",\"title\":\"Falošný odosielateľ/doménový squatting\"},{\"content\":\"Takýto kolega sa v spoločnosti vôbec nenachádza. Pri prvom kontakte si overte identitu kolegov (napr. prostredníctvom oficiálneho adresára).\",\"onNext\":[\"is-unfocused\",\"i1\"],\"onShow\":[\"is-focused\",\"i1\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i1\",\"title\":\"Fiktívna osoba\"},{\"content\":\"Informácie vzbudzujú dojem, že treba konať rýchlo. Podvodníci často umelo vytvárajú časovú tieseň, aby vás naviedli na neuvážené činy. Preto nezabudnite vždy aspoň dvakrát skontrolovať, či správa nenaznačuje, že ide o mimoriadne naliehavú záležitosť.\",\"onNext\":[\"is-unfocused\",\"i2\"],\"onShow\":[\"is-focused\",\"i2\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i2\",\"title\":\"Časová tieseň\"},{\"content\":\"Útočníci často kopírujú štýl a logiku oficiálnych systémových správ, aby sa phishingové e-maily javili ako oficiálne. Často sa však čiastočne líšia od skutočne používaných oficiálnych správ. V prípade pochybností porovnajte e-mail s predchádzajúcimi systémovými správami, ktoré poznáte.\",\"onNext\":[\"is-unfocused\",\"i3\"],\"onShow\":[\"is-focused\",\"i3\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i3\",\"title\":\"Efekt oficiálnej správy\",\"showCTAButton\":true,\"ctaLabel\":\"Spätná väzba\",\"onCTA\":[\"is-cta\"]}]}"},"sl":{"interactive":"{\"i18n\":{\"nextBtn\":\"Nadaljuj\",\"prevBtn\":\"Nazaj\",\"doneBtn\":\"Preskoči\",\"skipBtn\":\"Nazaj\",\"closeTooltip\":\"Zapri\"},\"onEnd\":[\"is-unfocused\",\"i3\"],\"id\":\"t1fe45c33a80a44579be1f15633648097\",\"showPrevButton\":true,\"steps\":[{\"content\":\"Napadalci pogosto uporabljajo metodo, imenovano \\\"domensko skvoterstvo\\\" za izboljšanje vtisa legitimnosti sporočila. V tem primeru izberejo naslov pošiljatelja za odpremo, ki je zelo podoben dejanskemu e-poštnemu naslovu. Če torej prejmete nepričakovana sporočila, bodite pozorni na naslov domnevnega pošiljatelja in ga primerjajte z izvirnim, ki ga poznate.\",\"onNext\":[\"is-unfocused\",\"sender\"],\"onShow\":[\"is-focused\",\"sender\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"sender\",\"title\":\"Lažni pošiljatelj / domensko skvoterstvo\"},{\"content\":\"Ta sodelavec sploh ne obstaja v podjetju. Preverite identiteto sodelavcev (npr. preko uradnega imenika), ko se prvič obrnejo na vas.\",\"onNext\":[\"is-unfocused\",\"i1\"],\"onShow\":[\"is-focused\",\"i1\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i1\",\"title\":\"Izmišljena oseba\"},{\"content\":\"Informacije kažejo, da je treba ukrepati hitro. Goljufi pogosto umetno ustvarijo časovni pritisk, da podprejo nepremišljeno dejanje. Zato vedno preverite vsaj dvakrat, če sporočilo nakazuje, da gre za posebno nujnost.\",\"onNext\":[\"is-unfocused\",\"i2\"],\"onShow\":[\"is-focused\",\"i2\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i2\",\"title\":\"Časovni pritisk\"},{\"content\":\"Napadalci pogosto kopirajo slog in logiko uradnih sistemskih sporočil, da lažna e-poštna sporočila izgledajo uradna. Vendar pa pogosto do neke mere odstopajo od dejansko uporabljenih uradnih sporočil. Če ste v dvomih, primerjajte e-poštno sporočilo s prejšnjimi sistemskimi sporočili, ki jih poznate.\",\"onNext\":[\"is-unfocused\",\"i3\"],\"onShow\":[\"is-focused\",\"i3\"],\"placement\":\"bottom\",\"showPrevButton\":true,\"target\":\"i3\",\"title\":\"Uradni učinek\",\"showCTAButton\":true,\"ctaLabel\":\"Povratne informacije\",\"onCTA\":[\"is-cta\"]}]}"}},"logo":"https://storage.sosafe.de/customers/customer_10834/8616ad1ec85d4e98.png?Expires=1777075200&Key-Pair-Id=K1S7LZSO2T6QBG&Signature=Z84XPvZTwnAAE70vZS8ybwUcQyTcR7mj3utWKZ4hh6sVzbc6AmIZ0uIxJGVuz-~SFZIl5fXcVewAYqmhwI9fi0SNVLg3yW-eW-5hcxF634~7LoDZi43EHJ-d8601T7kpmCF3TVpxIOBWRW7aFm40ipI8rdqcZ1c5smhHwncbOHrDAg4xRmffcUhlnBoM8ZYb~kBJPGx6UW8dyoJc2BdWOW5Exulur9jtJ5TztRR2sfF62GOifSu9dvZmw0eYkoh8lPD24LuKnP-qb6XC8vjg4sdfTV-OVzx3apmTFk7XrW2h8kRDSIPhqfnRJt5YHox04cMX9bZxQtvhhgvjXeqX2w__","text":{"de":{"id":5876,"customer_id":10834,"language":"de","content":"<div>\n            <p>Die E-Mail, auf die Sie soeben geklickt haben, ist Teil einer autorisierten\n                <span><b>Simulation von Cyberangriffen im Auftrag der Telekom Security</b>.\n                Ziel ist es, Ihnen zu zeigen, worauf Sie achten müssen, um derartige Attacken erkennen und verhindern zu können.\n            </span></p>\n            <br />\n            <ul>\n                <li>Es besteht <b>keine Gefahr</b> für Sie, Ihre Daten oder Ihr Endgerät –\n                    die Simulation dient lediglich zu Schulungszwecken</li>\n                <li>Es werden <b>keine individuellen Daten</b> (z. B. ob Sie auf einzelne\n                    Mails klicken) an Ihren Arbeitgeber zurückgemeldet</li>\n                <li>Klicken Sie auf <b>Erklärung starten</b>, um konkrete Hinweise zu der von\n                    Ihnen geklickten Mail angezeigt zu bekommen</li>\n            </ul>\n            <br />\n            <p class=\"u-text\"> Wir empfehlen, Ihren Lernerfolg und den Inhalt der Phishing-Mails nicht mit Kolleginnen und Kollegen zu teilen.\n            So haben alle Teilnehmenden die Chance, von der Phishing-Simulation zu profitieren. </p>\n        </div>","primaryColor":null,"secondaryColor":null,"warnColor":null,"footerColor":null,"legalColor":null,"markerColor":null,"header":"Glück gehabt! Dies hätte eine Phishing-Mail sein können...","tourColor":null,"hideLogo":false,"switchLogo":false,"alternativeLogo":null,"hideAbout":false,"learn_header":"Richtig! Dies ist eine simulierte Phishing-Mail!","learn_content":"<div>\n            <p>Die E-Mail, die Sie soeben gemeldet haben, ist Teil einer autorisierten\n                <span><b>Simulation von Cyberangriffen im Auftrag der Telekom</b>.\n                Ziel ist es, Ihnen zu zeigen, worauf Sie achten müssen, um derartige Attacken erkennen und verhindern zu können.\n            </span></p>\n            <br />\n            <ul>\n                <li>Es besteht <b>keine Gefahr</b> für Sie, Ihre Daten oder Ihr Endgerät –\n                    die Simulation dient lediglich zu Schulungszwecken</li>\n                <li>Es werden <b>keine individuellen Daten</b> (z. B. ob Sie auf einzelne\n                    Mails klicken) an Ihren Arbeitgeber zurückgemeldet</li>\n                <li>Klicken Sie auf <b>Erklärung starten</b>, um konkrete Hinweise zu der von\n                    Ihnen geklickten Mail angezeigt zu bekommen</li>\n            </ul>\n            <br />\n            <p class=\"u-text\"> Wir empfehlen, Ihren Lernerfolg und den Inhalt der Phishing-Mails nicht mit Kolleginnen und Kollegen zu teilen.\n            So haben alle Teilnehmenden die Chance, von der Phishing-Simulation zu profitieren. </p>\n        </div>"},"en":{"id":9759,"customer_id":10834,"language":"en","content":"<div>\n            <p>The email you just clicked on is part of an authorized\n                <span><b>cyber-attack simulation on behalf of Telekom Security</b></span>.\n                The aim is to show you what you need to watch out for in order to identify and prevent these kinds of attacks.\n            </p>\n            <br />\n            <ul>\n                <li>There is <span><b>no danger</b></span>\n                    to you, your data or your device—this is only a training simulation</li>\n                <li><span><b>No individual data</b></span>\n                    (e.g. whether you click on a phishing link) will be reported back to your employer</li>\n                <li>Click <span><b>start explanation</b></span>\n                    to view specific phishing hints in this email</li>\n            </ul>\n            <br />\n            <p class=\"u-text\">We advise you not to discuss your learning experience or the content of the phishing emails with your colleagues. This will allow all the participants to benefit from the phishing simulation.</p>\n        </div>","primaryColor":null,"secondaryColor":null,"warnColor":null,"footerColor":null,"legalColor":null,"markerColor":null,"header":"You're lucky! This could have been a phishing email...","tourColor":null,"hideLogo":false,"switchLogo":false,"alternativeLogo":null,"hideAbout":false,"learn_header":"Correct! This is a simulated phishing email!","learn_content":"<div>\n            <p>The email you just reported is part of an authorized\n                <span><b>cyber-attack simulation on behalf of Telekom</b></span>.\n                The aim is to show you what you need to watch out for in order to identify and prevent these kinds of attacks.\n            </p>\n            <br />\n            <ul>\n                <li>There is <span><b>no danger</b></span>\n                    to you, your data or your device—this is only a training simulation</li>\n                <li><span><b>No individual data</b></span>\n                    (e.g. whether you click on a phishing link) will be reported back to your employer</li>\n                <li>Click <span><b>start explanation</b></span>\n                    to view specific phishing hints in this email</li>\n            </ul>\n            <br />\n            <p class=\"u-text\">We advise you not to discuss your learning experience or the content of the phishing emails with your colleagues. This will allow all the participants to benefit from the phishing simulation.</p>\n        </div>"},"fr":{"id":13718,"customer_id":10834,"language":"fr","content":"<div>\n            <p>L’e-mail sur lequel vous venez de cliquer fait partie d’une\n                <span><b>simulation de cyber-attaques autorisée de Telekom</b></span>.\n                L’objectif consiste à vous montrer les points sur lesquels vous devez être vigilant pour identifier et éviter les attaques.\n            </p>\n            <br />\n            <ul>\n                <li>Vous ne courez <span><b>aucun risque</b></span>.\n                    Ni pour vos données, ni pour votre appareil. La simulation n’a qu’un objectif de formation.</li>\n                <li><span><b>Aucune de vos données personnelles</b></span>\n                    (par ex. si vous cliquez sur des e-mails) ne sera transmise à votre employeur.</li>\n                <li>Cliquez sur <span><b>Lancer l’explication</b></span>\n                    pour afficher des indications concrètes sur l’e-mail sur lequel vous avez cliqué.</li>\n            </ul>\n            <br />\n            <p class=\"u-text\">Nous vous déconseillons de discuter de votre expérience en formation ou du contenu des e-mails d'hameçonnage avec vos collègues.\n                Cela permettra à tous les participants de bénéficier de la simulation d'hameçonnage.</p>\n        </div>","primaryColor":null,"secondaryColor":null,"warnColor":null,"footerColor":null,"legalColor":null,"markerColor":null,"header":"Vous avez de la chance! Cela aurait pu être un e-mail piraté...","tourColor":null,"hideLogo":false,"switchLogo":false,"alternativeLogo":null,"hideAbout":false,"learn_header":"C'est vrai ! Il s'agit d'une simulation d'e-mail de phishing !","learn_content":"<div>\n            <p>L'e-mail que vous venez de signaler fait partie d'une\n                <span><b>simulation de cyber-attaques autorisée de Telekom</b></span>.\n                L’objectif consiste à vous montrer les points sur lesquels vous devez être vigilant pour identifier et éviter les attaques.\n            </p>\n            <br />\n            <ul>\n                <li>Vous ne courez <span><b>aucun risque</b></span>.\n                    Ni pour vos données, ni pour votre appareil. La simulation n’a qu’un objectif de formation.</li>\n                <li><span><b>Aucune de vos données personnelles</b></span>\n                    (par ex. si vous cliquez sur des e-mails) ne sera transmise à votre employeur.</li>\n                <li>Cliquez sur <span><b>Lancer l’explication</b></span>\n                    pour afficher des indications concrètes sur l’e-mail sur lequel vous avez cliqué.</li>\n            </ul>\n            <br />\n            <p class=\"u-text\">Nous vous déconseillons de discuter de votre expérience en formation ou du contenu des e-mails d'hameçonnage avec vos collègues.\n                Cela permettra à tous les participants de bénéficier de la simulation d'hameçonnage.</p>\n        </div>"}},"brand":{"id":16090,"customer_id":10834,"primary_color":"rgba(226, 0, 116, 1)","secondary_color":"rgba(226, 0, 116, 1)","footer_color":"rgba(153, 162, 163, 1)","legal_color":null,"marker_color":"rgba(243, 156, 18, 0.75)","warn_color":"rgba(226, 0, 116, 1)","tour_color":null,"hide_about":true,"switch_logo":true,"hide_logo":true,"alternative_logo":null,"area":0,"created":"2022-08-25T11:38:30.626Z","primary_background_color":"rgba(226, 0, 116, 0.1)","secondary_background_color":"rgba(226, 0, 116, 0.1)","primary_text_color":"rgba(40, 42, 43, 1)","hide_info":false,"button_text_color":"rgba(255, 255, 255, 1)","primary_light_color":null,"secondary_light_color":null,"wave_color":null,"bubble_color":null,"progress_color":null,"progress_light_color":null,"title_color":null,"button_color":null,"button_dark_color":null,"show_logo":false,"custom_certificate":null,"button_primary_color":null,"sidebar_color":null,"sidebar_text_color":null,"hide_phishing_report_button":true,"hide_phishing_report_button_info":true,"version_id":"5c28f797-7acf-4d64-9a36-b374e313f65b"},"imprint":null,"privacy":null,"support":null,"show_link":false,"lms_link":null,"elearning_domain":"awarenessacademy.security.telekom.com","learning_domain":"learning.security.telekom.com","feedback":true,"copyright":true,"tab_title_prefix":null,"footer_logo":"https://storage.sosafe.de/customers/customer_10834/3je8dh29s2od9.png?Expires=1777075200&Key-Pair-Id=K1S7LZSO2T6QBG&Signature=V5lOESdpcn4RMy3k9HJTV9US~ZtYYlXbW~86FS6CXmXu5T0b2WrMKBobPuiICYhbBNvO06UH-OR0Li6S-kEKsoQXoXaD-9n4yi-Rr8c4VsGxPQNWIG1-pSmPXLCikhi0E4ROe8GP3JlpoSFf5x8fX4b0~rQFgUXotM76zdaqy4jAzK0zjb0o0~9GBgYqL-lNN7vqtra4Eg5zPWFstjip7hjctjcTtZTci4IWfCieaxX9LHCWayOlnAomWUoXepk8nbny7pzwmrfJl9UwMYrHCt-piESu09Fq9DLbeGXbJsM8Y-KvOuOOX35jIgWOm8Tf6YRuVlNmSuRHuktWXaZWSg__","favicon":null,"difficulty":2,"context":1,"tags":[{"id":2,"de":"Neugier / Interesse","vector":1,"en":"Curiosity","fr":"Curiosité"},{"id":4,"de":"Vertrauen / Intimität","vector":1,"en":"Trust / intimacy","fr":"Confiance / intimité"},{"id":13,"de":"Hilfsbereitschaft","vector":1,"en":"Helpfulness","fr":"Serviabilité"},{"id":16,"de":"Domain-Squatting","vector":2,"en":"Domain squatting","fr":"Cybersquattage"},{"id":10,"de":"Link-Ausführung","vector":2,"en":"Link execution","fr":"Exécution du lien"}]},"landingpages":["virus-scan.com-raw.net","sheets-webapp.com-list.com","login-live.com-s02.net","transfer-online.com-2983raw8jw498oq7har8ztq3988ner.com","event.com-s02.net","online-edit.com-document.com","live-login.com-encrypted.net","user-login.com-live.net","logln.com-protected.net","virusscan-online.com-sec.net","mail-live.net-s03.net","auth.com-trusted.org","secure.update.com-s02.net","offlce-2983raw8jw498oq7har8ztq3988ner.com-encrypted.net","support.de-server.info","poll.online-com.net","office-online.com-s02.info","go0gie.net-s03.net","login-live.com-s02.info","inbox.com-redirected.net","text-edit.net-webapp.net","login-online.com-encrypted.net","officeonline.com-s02.net","consent.net-secu.net","powerpoint-webapp.safelink-protection.com","dropbag.com-s02.net","office365.com-sec.net","calc-edit.com-sheets.com","linked.com-encrypted.net","plan.com-s02.info","login.de-server.info","support.com-s02.info","transfer-online.com-2983raw8jw498oq7har8ztq3988ner.com","powerpoint-online.com-s02.net","word-online.com-s02.net","support.com-s02.net","ss0.secu-net.com","plan.com-s02.net","sec-update.com-middle.com","auth-check.net-medium.com","document.com-s02.net","linked-in.com-encrypted.net","edit-online.com-now.com","event.de-server.info","login.microsafeonline.com-s02.net","plan.de-server.info","event.com-s02.info","signin.net-ssl.com","re-captcha.com-redirect.net","mail-inbox.sec-com.net","login.com-s02.net","company-event.net-de.net","support-portal.com-raw.com","ppt-webapp.net-lite.com","file-share.com-impro.com","virusscan.com-s02.net","payme.com-s02.net","sso.com-s02.net","mail.com-s02.net","excel-secure.offlce365-online.com","user-logln.net-protected.net","microsafeonline-login.com-sec.net","auth.com-web.net","secure-app.online-protector.net","transfer.com-s02.net","plan-online.com-sec.net","ppm.now-com.net","support-online.com-encrypted.net","in.com-lite.com","excel-online.com-s02.net","login.com-s02.info","intranet.internal-secure.com","schedule.com-bit.net","file-transfer.com-c0m.net","auth.net-ssl.com","linked.com-s02.net","l0gin.com-safe.net"],"amplitude":{"customerUuid":"46f2c055-4013-4d94-854b-7cb6edb8aa48","mandantUuid":"0a0fa09d-ec6f-4b9b-8b84-04f48ea7929b","userUuid":null,"enabled":true,"templateId":"9967dc41-15d5-4f71-84fd-00571537a13d","campaignId":"c0d9a50d-b921-4098-aae3-0d9ce1a823f9"}}}