Sky forwards the email to Baz in IT

Sky hovers over the attachment once more.
Still unsure... Still tempted to just click.
But something doesn’t sit right.
Jo hasn’t replied.
Baz’s name had appeared once, in a thin staff handbook that was more about coffee machines than cyber threats.
Apparently, he’s the IT guy. The one who handles “all that stuff.”
Sky drafts a message. Keeps it short.
“Hi Baz – I just received this email. Not sure if it’s legit.
Could you check the attachment before I open it?”
Sent.
Ten minutes later, Baz replies.
“Good spot. That’s a phishing attempt.
The attachment contains malicious payload, opening the attachment would’ve triggered an exploit.”
Sky’s stomach flips.
So it wasn’t just a weird CV.
It was a trap.
And she nearly fell for it.
Baz follows up:
“Well done for flagging. Forward anything else like this straight to me.
We’ll scan and block the domain the email originated from.
You probably just saved the network.”
✅ Sky made the right call.
No breach.
No embarrassment.
Just a quiet, correct action—and a lesson they won’t forget.
Despite the gaps in awareness and training!
➡️ Go to: Breach Contained