All Collections
Privacy and security
Identification of spam and phishing messages in MICE Operations
Identification of spam and phishing messages in MICE Operations
Tjeu Hendrickx avatar
Written by Tjeu Hendrickx
Updated over a week ago

Security and Awareness

In the rare event that you receive unwanted emails (with MICE Operations as the sender), it is crucial to know how to protect your business and personal data. At MICE Operations, we put your online security above everything else. Here is what you need to know:

1. MICE Operations does not send unsolicited instructional emails

It is important to understand that we never send unsolicited emails with instructions to perform certain actions. We will never ask you to change or validate your password, two-factor authentication (2FA), or share or edit other personal data, without your request. Instructional emails will be sent to someone within your organisation only after you have taken specific actions in your MICE system, such as adding a new user.

2. Do not just click on links and do not carry out unknown instructions

To protect your business and personal data, it is essential to be careful with unknown e-mails. Never just click on links and never simply carry out instructions in emails you don't trust.

3. Always verify emails with instructions from MICE Operations

If you unexpectedly receive an e-mail that appears to come from MICE Operations, but you have doubts about its authenticity, always contact us first to verify the authenticity of the e-mail.

4. Forward suspicious messages to us

We appreciate it if you forward suspicious emails with MICE Operations as the sender to us. Contact us via chat to ask where to send the message. Our technical experts can trace the source of the messages, contributing to an even more secure system and email traffic for all of us.

At MICE Operations, your security is our top priority, and together we can ensure that your experience with our software remains safe and secure.

5. Delete the message

Once you have forwarded the suspicious message to us, we recommend that you delete the message. As an extra precaution, it is advisable to inform your colleagues and instruct them to do the same.

Did this answer your question?