SlideShare a Scribd company logo
1 of 19
Removing The Bait From
Phishing Attacks
Presented By:
Who We Are
Michael Green, Just-Tech
Mike is a Technical Consultant & Engineer at Just-Tech with over 18 years of
experience in the field of Information Technology, and works with clients on
project planning and systems implementation. He also works as an engineer
behind the scenes.
Mary O’Shaughnessy, Her Justice
Mary has long experience in for-profit and nonprofit technology services,
including technology audit. She has been Director, Information Services at Her
Justice since 2012.
What is Phishing?
An attempt to bait a user into giving up
sensitive information or to otherwise provide
access to their system.
Why are they doing this?
Their end-game is $Money$!
Most common methods to accomplish:
1. Compromise systems and key user
accounts who have control over finances
and move money covertly themselves.
2. Hold systems and/or data hostage for a
ransom payment.
Impact
● Access to CMS- client information & disclosure rules
● Access to internal files- ID theft & personal info
● Damage to reputation/community relationship
● Increased recovery cost if unprepared
● System downtime
The Phisherman’s Bait
● Disguised to mislead- FedEx/Invoices, Client Assistance/Urgent Emails
● Can be personalized (Spear Phishing) (Whaling: targeting top executives)
● Password Reset phishing/Fake communications from IT
● URL manipulation - falsifying hyperlinks
● Attachments with malware
How to recognize it?
Though the Phishers are deceptive in their tactics, there are tell-tale signs of
fake information.
1. The email is threatening, provoking, or pretends to be authentic
correspondence, in an effort to get you to open attachments or click links
on impulse. Phishers need you to “take the bait” and allow them in.
2. The actual sender’s email address does not match who they claim to be.
3. Mouse-over hyperlinks reveal sketchy website destination.
4. Porr sppelling or errors grammatical.
5. Sender claims to be internal, popular, or reputable source.
Real examples of Phishing
Real examples of Phishing
Real examples of Phishing
Real examples of Phishing
If you were to look up the “shipment number” on the UPS website, you would
get an error message stating that this is not a valid number.
What to copy from Outlook
With the email open, click on File.
Click on Properties.
Copy everything in the
Internet headers box.
Note that the email address
is not really UPS - originated.
Technology Prevention
● Keep systems & antivirus updated and enabled
● Have measures in place (disable URLs/scan
attachments where possible)
● Reliable Backups and Recovery Plan
● Cyber Insurance
Human Prevention
● Check with IT for verification before action
● Ignore unsolicited email links & attachments
● Continual Training & “Cheat Sheets” for staff
● When in doubt, Ask about
● Add to Junk Mail list
Policies - Acceptable Use, Mobile Device, Guest Use, & Email policies are just a
few
New Staff/Veterans/Volunteers - Whether they started yesterday or 20 years
ago, continual training and coaching is a necessary component to prevention.
Viruses and Malware continue to evolve, we need to adapt as well
Training Practice
https://www.phishingbox.com/
US Computer Emergency Response Team tips
https://www.us-cert.gov/ncas/tips/ST04-014
Policies/Training
Helpful Resources
● LSNTAP-lsntap.org
● Idealware- www.idealware.org
● Security Awareness Training-www.travelingcoaches.com
● You Tube Videos- While not tailored, can provide self-help
● Resources on corporate identity theft-
just-tech.com
929.277.9800 CHANGE EVENT OR PRESENTATION TITLE ON MASTER – 1ST SLIDE
just-tech.com
929.277.9800
Michael Green 929-277-0610
mgreen@just-tech.com
Mary O’Shaughnessy 646-442-1179
moshaughnessy@herjustice.org
Contact Us
just-tech.com
929.277.9800 CHANGE EVENT OR PRESENTATION TITLE ON MASTER – 1ST SLIDE
just-tech.com
929.277.9800
Thanks!
just-tech.com
929.277.9800 CHANGE EVENT OR PRESENTATION TITLE ON MASTER – 1ST SLIDE
just-tech.com
929.277.9800

More Related Content

What's hot

Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 

What's hot (20)

Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Best Practices for Password Creation
Best Practices for Password CreationBest Practices for Password Creation
Best Practices for Password Creation
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Phishing simulation exercises
Phishing simulation exercisesPhishing simulation exercises
Phishing simulation exercises
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
RP Phishing Awareness
RP Phishing Awareness RP Phishing Awareness
RP Phishing Awareness
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Phishing
PhishingPhishing
Phishing
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 

Similar to Teaching Your Staff About Phishing

Information Ethics
Information EthicsInformation Ethics
Information Ethics
UMaine
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
Mark Bennett
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docx
gemaherd
 

Similar to Teaching Your Staff About Phishing (20)

Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
Where security and privacy meet partnering tips for CSOs and privacy/complian...
Where security and privacy meet partnering tips for CSOs and privacy/complian...Where security and privacy meet partnering tips for CSOs and privacy/complian...
Where security and privacy meet partnering tips for CSOs and privacy/complian...
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
The Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftThe Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data Theft
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take next
 
Footprintig(Haching)
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)
 
Footprintig (Haching)
Footprintig (Haching)Footprintig (Haching)
Footprintig (Haching)
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docx
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Human Error in Cyber Security Breaches | Cyberroot Risk Advisory
Human Error in Cyber Security Breaches | Cyberroot Risk AdvisoryHuman Error in Cyber Security Breaches | Cyberroot Risk Advisory
Human Error in Cyber Security Breaches | Cyberroot Risk Advisory
 
How Much Do You Trust Email?
How Much Do You Trust Email?How Much Do You Trust Email?
How Much Do You Trust Email?
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 

More from Legal Services National Technology Assistance Project (LSNTAP)

More from Legal Services National Technology Assistance Project (LSNTAP) (20)

Language Access Webinar
Language Access WebinarLanguage Access Webinar
Language Access Webinar
 
Free and Low Cost Technology Tools for Legal Aid
Free and Low Cost Technology Tools for Legal AidFree and Low Cost Technology Tools for Legal Aid
Free and Low Cost Technology Tools for Legal Aid
 
50 Tech Tips
50 Tech Tips50 Tech Tips
50 Tech Tips
 
Sharelaw + Video Tips
Sharelaw + Video TipsSharelaw + Video Tips
Sharelaw + Video Tips
 
Intro to UX
Intro to UXIntro to UX
Intro to UX
 
Online Dispute Resolution
Online Dispute ResolutionOnline Dispute Resolution
Online Dispute Resolution
 
Supporting Mobile Pro Bono Attorneys
Supporting Mobile Pro Bono AttorneysSupporting Mobile Pro Bono Attorneys
Supporting Mobile Pro Bono Attorneys
 
Guide to Office 365
Guide to Office 365Guide to Office 365
Guide to Office 365
 
The State of E-Filing 2017
The State of E-Filing 2017The State of E-Filing 2017
The State of E-Filing 2017
 
Intro to Data Analysis Framework
Intro to Data Analysis Framework Intro to Data Analysis Framework
Intro to Data Analysis Framework
 
Language Access for Legal Aid Websites
Language Access for Legal Aid WebsitesLanguage Access for Legal Aid Websites
Language Access for Legal Aid Websites
 
Data Visualization Tools
Data Visualization ToolsData Visualization Tools
Data Visualization Tools
 
Data Visualization Tools
Data Visualization Tools Data Visualization Tools
Data Visualization Tools
 
Creating a Technology Disaster Plan
Creating a Technology Disaster PlanCreating a Technology Disaster Plan
Creating a Technology Disaster Plan
 
Factors in Software Selection
Factors in Software SelectionFactors in Software Selection
Factors in Software Selection
 
Can i work remotely
Can i work remotelyCan i work remotely
Can i work remotely
 
Intro to data analysis framework april 25 2017
Intro to data analysis framework april 25 2017Intro to data analysis framework april 25 2017
Intro to data analysis framework april 25 2017
 
LSC Tech Baselines
LSC Tech BaselinesLSC Tech Baselines
LSC Tech Baselines
 
Legal Aid Tech Baseline 2016
Legal Aid Tech Baseline 2016 Legal Aid Tech Baseline 2016
Legal Aid Tech Baseline 2016
 
User Testing
User TestingUser Testing
User Testing
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Teaching Your Staff About Phishing

  • 1. Removing The Bait From Phishing Attacks Presented By:
  • 2. Who We Are Michael Green, Just-Tech Mike is a Technical Consultant & Engineer at Just-Tech with over 18 years of experience in the field of Information Technology, and works with clients on project planning and systems implementation. He also works as an engineer behind the scenes. Mary O’Shaughnessy, Her Justice Mary has long experience in for-profit and nonprofit technology services, including technology audit. She has been Director, Information Services at Her Justice since 2012.
  • 3. What is Phishing? An attempt to bait a user into giving up sensitive information or to otherwise provide access to their system.
  • 4. Why are they doing this? Their end-game is $Money$! Most common methods to accomplish: 1. Compromise systems and key user accounts who have control over finances and move money covertly themselves. 2. Hold systems and/or data hostage for a ransom payment.
  • 5. Impact ● Access to CMS- client information & disclosure rules ● Access to internal files- ID theft & personal info ● Damage to reputation/community relationship ● Increased recovery cost if unprepared ● System downtime
  • 6. The Phisherman’s Bait ● Disguised to mislead- FedEx/Invoices, Client Assistance/Urgent Emails ● Can be personalized (Spear Phishing) (Whaling: targeting top executives) ● Password Reset phishing/Fake communications from IT ● URL manipulation - falsifying hyperlinks ● Attachments with malware
  • 7. How to recognize it? Though the Phishers are deceptive in their tactics, there are tell-tale signs of fake information. 1. The email is threatening, provoking, or pretends to be authentic correspondence, in an effort to get you to open attachments or click links on impulse. Phishers need you to “take the bait” and allow them in. 2. The actual sender’s email address does not match who they claim to be. 3. Mouse-over hyperlinks reveal sketchy website destination. 4. Porr sppelling or errors grammatical. 5. Sender claims to be internal, popular, or reputable source.
  • 8. Real examples of Phishing
  • 9. Real examples of Phishing
  • 10. Real examples of Phishing
  • 11. Real examples of Phishing If you were to look up the “shipment number” on the UPS website, you would get an error message stating that this is not a valid number.
  • 12. What to copy from Outlook With the email open, click on File. Click on Properties. Copy everything in the Internet headers box. Note that the email address is not really UPS - originated.
  • 13. Technology Prevention ● Keep systems & antivirus updated and enabled ● Have measures in place (disable URLs/scan attachments where possible) ● Reliable Backups and Recovery Plan ● Cyber Insurance
  • 14. Human Prevention ● Check with IT for verification before action ● Ignore unsolicited email links & attachments ● Continual Training & “Cheat Sheets” for staff ● When in doubt, Ask about ● Add to Junk Mail list
  • 15. Policies - Acceptable Use, Mobile Device, Guest Use, & Email policies are just a few New Staff/Veterans/Volunteers - Whether they started yesterday or 20 years ago, continual training and coaching is a necessary component to prevention. Viruses and Malware continue to evolve, we need to adapt as well Training Practice https://www.phishingbox.com/ US Computer Emergency Response Team tips https://www.us-cert.gov/ncas/tips/ST04-014 Policies/Training
  • 16. Helpful Resources ● LSNTAP-lsntap.org ● Idealware- www.idealware.org ● Security Awareness Training-www.travelingcoaches.com ● You Tube Videos- While not tailored, can provide self-help ● Resources on corporate identity theft-
  • 17. just-tech.com 929.277.9800 CHANGE EVENT OR PRESENTATION TITLE ON MASTER – 1ST SLIDE just-tech.com 929.277.9800 Michael Green 929-277-0610 mgreen@just-tech.com Mary O’Shaughnessy 646-442-1179 moshaughnessy@herjustice.org Contact Us
  • 18. just-tech.com 929.277.9800 CHANGE EVENT OR PRESENTATION TITLE ON MASTER – 1ST SLIDE just-tech.com 929.277.9800 Thanks!
  • 19. just-tech.com 929.277.9800 CHANGE EVENT OR PRESENTATION TITLE ON MASTER – 1ST SLIDE just-tech.com 929.277.9800

Editor's Notes

  1. Sart
  2. Mike Start. Mary Intro herself
  3. Mike
  4. Mike
  5. Mary to start What can go wrong with getting phished? Client information can be disclosed, as can employee data. Bogus communications that look like they are from your organization (or actually from hacked valid email accounts) can damage your reputation. Talk about Petya ransomware
  6. Mary to take this -- “bait” gets your attention and move you to click or enter data, without being over-the-top in subject or action. Password resets are particularly invidious. If you get something that claims to be from IT, call an actual organization IT person known to you. URLs can be off by a domain ending, or a couple of switched letters. Hover over the link in the email to see what it really is. Attachments can look like they have innocent extensions, but hide additional ones past the first dot-three-letters.
  7. Mary to describe signs and symptoms :) Common fakes: IRS, Microsoft, Apple, Homeland Security. The email address is misspelled or has a nonsense domain. The mouse-over is a safe way of examining a hyperlink.
  8. Mary to point out the misspellings and disconnect between email address and alleged sender. See bad sentence structure. csims@addisonpark.org is real but it doesn’t make any sense that you would be getting an IT email from that person.
  9. Mike to discuss apparently valid email addresses.
  10. Mike to discuss sense of urgency and “state attorney.” Bogus attachment claiming to be a legitimate .pdf
  11. Mary to discuss invalid UPS information and bad link. If you get information about a shipment, go directly to the shipper’s website and do not rely on links.
  12. Mary: You don’t have to read every line of the detail--just look at that From:
  13. Mike Intro https://www.bankinfosecurity.com/nhs-denies-widespread-windows-xp-use-a-9915 It’s ok to not update Microsoft patches the day they are released. Test your backups regularly--at least monthly. Multiple backups from different points in time are good, in case an infected/hacked system gets backed up accidentally.
  14. Mike Intro. https://www.bankinfosecurity.com/nhs-denies-widespread-windows-xp-use-a-9915 It’s ok to not update Microsoft patches the day they are released, but patch updates should not be postponed for months. Pass no judgments on anyone who asks you to look at an email. Be encouraging, especially of their asking before clicking. If it sounds fake, it probably is. 5 minutes to verify -vs- hours, days, potentially weeks, and $$$ to clean up and “recover”
  15. Mike Intro. Acceptable use--there is no expectation of privacy on work assets--computers and accounts (e.g. email) If you plan to do a phishing test, you should tell your Executive Director before sending it.
  16. Mary Intro. http://forums.techsoup.org/cs/community/b/tsblog/archive/2016/03/10/the-greatest-security-threat-is-already-inside-your-office.aspx
  17. Contact info
  18. Thank you and Q & A