Frequently Asked Questions
Need help while training? Click any question to expand its answer. Use the filters below to browse by category.
Hooked on Security is an interactive phishing awareness training experience platform designed to help users recognize and respond accordingly to suspicious emails and messages.
No. All content used in the scenarios is simulated and created for training purposes only.
Each section builds on the previous one to help reinforce skills before applying them in simulations.
No. The focus of this training is to raise awareness and reinforce learning, not scoring.
No. The training is designed to be completed step by step to build understanding.
After you've completed the training, you'll reinforce safe habits for recognizing suspicious messages in the future.
To help users recognize phishing attempts and make safer decisions before clicking, replying, or sharing information.
You'll receive feedback explaining the risk and what the safer course of action would have been.
These platforms reflect real communication environments where phishing attempts commonly occur.
A short set of questions designed to reinforce what you learned during the scenarios.
No. The goal is learning, not perfection. Feedback is provided to help you improve.
Immediate feedback helps reinforce correct behavior and explain potential risks.
The training will highlight what was missed and explain how to identify it next time.
Check the sender address for misspellings or unusual domains, look for urgent or threatening language, and be cautious of unexpected links or attachments. If anything feels off, verify through an official channel before acting.
No. Phishing can occur through messaging platforms, texts, and other communication tools.
Hover over the link before clicking to preview the destination URL. Check that it starts with https://, matches the sender's organization, and has no subtle misspellings (e.g. "drexeI.edu" with a capital I instead of a lowercase l). When in doubt, go directly to the official website instead of clicking the link.
Pause and verify it through a trusted or official channel before taking action.
Attackers use urgency to pressure users into acting quickly without thinking.
Yes. Many phishing attempts are designed to closely resemble real communications.
Phishing can lead to stolen information, compromised accounts, and significant security risks for both individuals and their organizations.
Hooked on Security