SlideShare ist ein Scribd-Unternehmen logo
1 von 9
What is phishing?
A type of fraud in which a hacker attempts to gather
personal information by impersonating a legitimate
source or by sending users to a malicious website.
Hackers try to obtain information that could help them
pose as someone else, usually to steal money or
intellectual property. They also try to infiltrate an
organization’s network, stealing credentials, disrupting
critical processes or encrypting (locking) data and
making it inaccessible until ransom demands are met.
Phishers can create fake emails that
appear from someone you trust, such
as a bank, a social media website or
even from a Ruhrpumpen account.
With the uptick in ransomware infections that are often
instigated through phishing emails, it’s crucial to take
proactive measures to help protect yourself and the
organization’s security.
10 things to watch
1
Don’t trust the display name of who the
email is from
Be sure to look at the email address to confirm the true
sender
6
Beware of urgency
The message may make you think there is an
emergency, they make you act without thinking, or urge
you to make an action like clicking on a link or opening
the attachment
2
Look but don’t click
Hover your mouse over parts of the email without
clicking, if the alternative text looks strange don’t click it
7
Check the email signature
Legitimate senders will include a full signature block at
the bottom
3
Check for spelling errors
A normal sender would care about spelling and
grammar, don’t you think?
8
Be careful with attachments
Attackers will trick you into opening or downloading the
attachment
4
Consider the salutation
Is it vague or really general? Is it addressed to “Dear
Sir/Madam” or “Valued customer”?
9
Don’t believe everything you see
It’s better to be safe than sorry, if you see something off
its OK to doubt (that Nigerian prince in trouble can wait)
5
Is the email asking for personal
information?
Legitimate companies do not ask for personal
information in the email
10
When in doubt, ask
No matter the time of day or the concern, report the
email to the IT department
The anatomy of a
phishing email
1. Email sent from
suspicious email address
2. Unsolicited attachment
3. Generic greetings
4. Text prompts you to
open attachment
5. Don’t rely on images, brand logos
and trademarks can be easily replicated
6. Toll free numbers that do
not match known numbers
The anatomy of a
phishing email
1. Email sent from a “good”
address, but unsolicited
2. Grammatical errors
3. Why do I have to go to a
website to see the message?
4. Checking the link. The alt text
tells us it leads to a strange link.
5. No signature, footer is a bit
off because it mentions
LinkedIn even when the
message was sent by “Donald”
The anatomy of a
phishing email
1. Email sent from a free gmail account,
weird name for an email address
2. Subject is about pumps, but not
exactly what someone would write as
Subject for an email
3. PDF attachment
4. No message contents
The anatomy of a
phishing email
1. Email sent from a legitimate
address inside Ruhrpumpen
2. Checking the other accounts,
we found someone using a
“bogus domain” (fake domain)
Hacker was messing with
a payment, tricking the
customer to make a
deposit to another bank.
How to spot a dangerous
email attachment?
Email attachments can be harmful, any type of file can be attached to an email.
85% of malicious emails have
these types of files attached: 7 Z
Other potentially dangerous attachments include:
Is the sender someone you recognize and trust?
Microsoft Office Packaging of files
File extensions could be
changed to .doc(1),
making you think it is a
Word Document but
instead it is a malware.
IMPORTANT
What to do?
 Never give out personal or sensitive information based on an email
request.
 Don’t trust links or attachments in unsolicited emails.
 Hover over links in email messages to verify its actual destination, even if it
comes from a trusted source.
 Instead of clicking on the link, search on your web browser (Google it!).
 Be suspicious about phone numbers in emails. Use the phone number
found on a trusted directory instead.
Report these kind of emails
to the IT department

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing
Teaching Your Staff About Phishing
 
OWASP Top 10 - 2017
OWASP Top 10 - 2017OWASP Top 10 - 2017
OWASP Top 10 - 2017
 
Desktop Security
Desktop SecurityDesktop Security
Desktop Security
 
Web application security
Web application securityWeb application security
Web application security
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Phishing
PhishingPhishing
Phishing
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Network Security
Network SecurityNetwork Security
Network Security
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?
 
Directory Traversal & File Inclusion Attacks
Directory Traversal & File Inclusion AttacksDirectory Traversal & File Inclusion Attacks
Directory Traversal & File Inclusion Attacks
 
Phishing
PhishingPhishing
Phishing
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Phishing
PhishingPhishing
Phishing
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
social engineering
 social engineering social engineering
social engineering
 

Ähnlich wie RP Phishing Awareness

phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
amby3
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
Payza
 

Ähnlich wie RP Phishing Awareness (20)

Security awareness
Security awarenessSecurity awareness
Security awareness
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
5 Tell-Tale Signs of Phishing
5 Tell-Tale Signs of Phishing5 Tell-Tale Signs of Phishing
5 Tell-Tale Signs of Phishing
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
Common Email Security Mistakes
Common Email Security MistakesCommon Email Security Mistakes
Common Email Security Mistakes
 
How to Detect Email Fraud
How to Detect Email FraudHow to Detect Email Fraud
How to Detect Email Fraud
 
Gone Phishing Infographic
Gone Phishing Infographic Gone Phishing Infographic
Gone Phishing Infographic
 
How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?
 
Phishing email PDF Flyer
Phishing email PDF FlyerPhishing email PDF Flyer
Phishing email PDF Flyer
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You?
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...
 
S_A_T.pptx
S_A_T.pptxS_A_T.pptx
S_A_T.pptx
 

Kürzlich hochgeladen

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

RP Phishing Awareness

  • 1. What is phishing? A type of fraud in which a hacker attempts to gather personal information by impersonating a legitimate source or by sending users to a malicious website. Hackers try to obtain information that could help them pose as someone else, usually to steal money or intellectual property. They also try to infiltrate an organization’s network, stealing credentials, disrupting critical processes or encrypting (locking) data and making it inaccessible until ransom demands are met.
  • 2. Phishers can create fake emails that appear from someone you trust, such as a bank, a social media website or even from a Ruhrpumpen account. With the uptick in ransomware infections that are often instigated through phishing emails, it’s crucial to take proactive measures to help protect yourself and the organization’s security.
  • 3. 10 things to watch 1 Don’t trust the display name of who the email is from Be sure to look at the email address to confirm the true sender 6 Beware of urgency The message may make you think there is an emergency, they make you act without thinking, or urge you to make an action like clicking on a link or opening the attachment 2 Look but don’t click Hover your mouse over parts of the email without clicking, if the alternative text looks strange don’t click it 7 Check the email signature Legitimate senders will include a full signature block at the bottom 3 Check for spelling errors A normal sender would care about spelling and grammar, don’t you think? 8 Be careful with attachments Attackers will trick you into opening or downloading the attachment 4 Consider the salutation Is it vague or really general? Is it addressed to “Dear Sir/Madam” or “Valued customer”? 9 Don’t believe everything you see It’s better to be safe than sorry, if you see something off its OK to doubt (that Nigerian prince in trouble can wait) 5 Is the email asking for personal information? Legitimate companies do not ask for personal information in the email 10 When in doubt, ask No matter the time of day or the concern, report the email to the IT department
  • 4. The anatomy of a phishing email 1. Email sent from suspicious email address 2. Unsolicited attachment 3. Generic greetings 4. Text prompts you to open attachment 5. Don’t rely on images, brand logos and trademarks can be easily replicated 6. Toll free numbers that do not match known numbers
  • 5. The anatomy of a phishing email 1. Email sent from a “good” address, but unsolicited 2. Grammatical errors 3. Why do I have to go to a website to see the message? 4. Checking the link. The alt text tells us it leads to a strange link. 5. No signature, footer is a bit off because it mentions LinkedIn even when the message was sent by “Donald”
  • 6. The anatomy of a phishing email 1. Email sent from a free gmail account, weird name for an email address 2. Subject is about pumps, but not exactly what someone would write as Subject for an email 3. PDF attachment 4. No message contents
  • 7. The anatomy of a phishing email 1. Email sent from a legitimate address inside Ruhrpumpen 2. Checking the other accounts, we found someone using a “bogus domain” (fake domain) Hacker was messing with a payment, tricking the customer to make a deposit to another bank.
  • 8. How to spot a dangerous email attachment? Email attachments can be harmful, any type of file can be attached to an email. 85% of malicious emails have these types of files attached: 7 Z Other potentially dangerous attachments include: Is the sender someone you recognize and trust? Microsoft Office Packaging of files File extensions could be changed to .doc(1), making you think it is a Word Document but instead it is a malware. IMPORTANT
  • 9. What to do?  Never give out personal or sensitive information based on an email request.  Don’t trust links or attachments in unsolicited emails.  Hover over links in email messages to verify its actual destination, even if it comes from a trusted source.  Instead of clicking on the link, search on your web browser (Google it!).  Be suspicious about phone numbers in emails. Use the phone number found on a trusted directory instead. Report these kind of emails to the IT department