Technology for social justice
image description


Read the latest stories about how we’re using technology for good.

image description

During National Scams Awareness Week from 21 to 25 May, an anonymous organisation participated in a simulated phishing campaign to test staff behaviour and determine the level of vulnerability to an actual phishing attack. 

The testing provider sent an email containing elements of a phishing scam to all staff in the organisation. The email claimed that the recipient’s password would expire in 72 hours and prompted them to click a link to change it.

Results showed that 14% of users clicked on the link and a further 6% entered their details on the linked page, exposing themselves and their organisation to risk. On the positive side, 10% of the users reported the email to their IT Managed Services HelpDesk.

What is phishing?

Phishing is the process of trying to gain access to sensitive information such as usernames, passwords and other personal identifiers. Scammers design phishing emails to seem authentic and official, but they contain fraudulent links or attachments asking the recipient to do something or give up sensitive information. 

Example of the simulated phishing email:


Several indicators in this email provided evidence that it was a scam:

  • Suspicious-looking or unknown email address – any information regarding password changes will be conveyed through IT support teams and not from an unknown sender.
  • Suspicious-looking URL – the link to reset the password had several scam indicators such as unusual web domains and excessively long URL parameters.
  • The tone of the email created a sense of urgency and authority in asking the user to take specific actions.

What should staff do if they receive a phishing email?

The first step is learning to recognise phishing emails when they arrive:

  • Does the email claim to be from an official source but look different or "off" in some way?
  • Does the email try and create a sense of urgency to make you feel like immediate action is required?

The next step is checking the email for signs of phishing:

  • Do the sender name and email address match the source the email claims to be from (e.g. does it claim to be from your organisation's IT helpdesk but comes from an external email address)?
  • Sometimes a sender’s email can be imitated (what is known as email spoofing) or compromised with the email account used to send email. If an email request seems suspect, communicate with the sender via a different means e.g. via phone, to clarify they sent the email.
  • Hover over any links in the email but do not click on them. Does the link lead to an unfamiliar, unusual or complicated web address?
  • Does the email contain an attachment that you are not expecting? Do not open the attachment. It is best to call the sender to verify in this case.

If your staff suspect they have received a phishing email, they should:

  • Notify your IT support provider.
  • Report the message using their email client (this differs depending on which email client you use. For Outlook, use the "Report Message" function in the toolbar).
  • Follow any instructions the IT support provider staff give them.

If your staff suspect they may have clicked a link or submitted their details to a malicious site:

  • Notify your IT support provider immediately and follow their instructions.

More resources

To find out more on how you can protect your team against phishing attacks, visit the Australian Cyber Security Centre.

You can also access resources available for not-for-profits through the Digital Transformation Hub:

oOh!media and Infoxchange have today announced a community partnership to help drive awareness of Ask Izzy - a mobile website that supports vulnerable members of the community.

Meet Nic, a member of our Disability Reference Group who is helping us better meet the needs of people with disability, their families and carers through our products like Ask Izzy.

Our Board Chair Morgana Ryan tell us why she's passionate about The Observership Progam and using her influence to advocate for more opportunities for minorities to gain experience, and ultimately, governance positions.

Infoxchange and Connecting Up are thrilled to announce the winners of the Australian Not-for-Profit Technology Awards, which were presented at a gala dinner in Melbourne on Thursday evening.

Connecting Up and Infoxchange are excited to announce the finalists for the  2022 Australian Not-for-Profit Technology Awards.

Privacy Awareness Week runs from 2-8 May 2022. 

Infoxchange welcomes the Australian Government’s announcement of an additional $4.5 million in funding for Ask Izzy over the next five years.

Meet Brendon, a member of our Disability Reference Group.

The lineup for this year's Connecting Up Conference just keeps getting better. Take a look at our new additions.

Infoxchange is proud to lead a consortium appointed by the Western Australian Government to develop an Australian-first online portal to help those experiencing or at risk of homelessness to access accommodation services. 

I’d like to know more