Digital SkillsEasy

As an EU official assigned to the EU Diplomatic Representation Network, you receive an urgent email that appears to come from the European External Action Service (EEAS) requesting your login credentials (username and password) to 'verify your account' and prevent suspension of access to the Common Foreign and Security Policy (CFSP) systems. What is the most secure and appropriate action according to good cybersecurity practices and the principles of data protection in the EU? option_A: Respond immediately to the email with your credentials to demonstrate goodwill and ensure continuous access to the CFSP systems. option_B: Forward the email to all colleagues in the delegation to check if they have also received this security alert. option_C: Do not provide any sensitive information, verify the authenticity of the sender through official channels (not those of the email), and report the incident as a possible phishing attempt. option_D: Delete the email immediately without further action, assuming it is a phishing attempt, and report it through the EU's official security channels. option_E: Click on the link included in the email to directly check the status of your account on the EU's internal portal. Explanation: 1) **Why the correct answer is correct:** Option C is the only safe action. The European External Action Service (EEAS) and EU institutions never request login credentials (passwords) via email. Providing sensitive information in unverified requests violates fundamental security and data protection principles, exposing the EU and its officials to risks of identity theft and unauthorized access. The correct action is to not interact with the suspicious request and report it through established security channels. 2) **Analysis of incorrect options:** - Option A is a 'urgency and goodwill' trap: attackers use the temporary pressure and appearance of collaboration to make the user act without thinking. Providing passwords is always a security violation. - Option E is a 'direct interaction' trap: clicking on links in unsolicited emails can lead to fake websites (phishing) that steal data or install malware, even if the link seems legitimate. - Option D is a 'partial inaction' trap: while deleting the email is a step, not reporting it leaves the rest of the organization vulnerable and does not comply with EU security protocols that require reporting potential incidents for analysis. - Option B is a 'viralization' trap: forwarding a phishing email increases its spread and exposes more colleagues to risk, as well as saturating the email systems. 3) **Quick tip:** If an email asks for sensitive data or passwords, it is always a fake. Always verify through an independent channel and report the suspicion immediately.

Want adaptive practice that measures your real level?

Start free preparation →

More Digital Skills questions

A digital project officer for the European External Action S...You are a digital communications officer for the European Ex...An EU delegation member needs to securely share a document c...As a digital security officer for an EU delegation participa...A junior diplomat in the European External Action Service (E...