|Title||Make personnel report suspicious activity|
|Description||Make sure that personnel will report suspicious activity i.e. suspicious emails, links, files, activity on their computers, etc|
Develop a simplified, company wide-known way to contact IR team in case of suspicious activity on the user system.
Make sure that the personnel is aware of it, can and will use it.