This is a dedicated watch page for a single video.
A user in your organization reports that they received an email that appears to be from the company’s IT department, asking them to reset their password by clicking on a suspicious link. You suspect a phishing attack. Which of the following steps should you take first to address this issue?