Upon receiving an email that appears to be from a colleague requesting immediate access to a confidential account, what would be the safest and most appropriate action according to cybersecurity best practices?
Want adaptive practice that measures your real level?