SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Downloaden Sie, um offline zu lesen
Phishing Awareness
What is Phishing?
Phishing Is A Fake Email
The long definition is that phishing is the act
of attempting to acquire information such as
usernames and passwords by masquerading
as a trustworthy entity in an electronic
communication.
Is Phishing A Threat?
29%
of security breaches involve
social tactics, such as phishing
Source: 2013 Verizon Data Breach Investigations Report
71%
Phishing Is The
Most Used
Social Tactic
91% of targeted attacks
use spear-phishing emails.
Spear-Phishing is when detailed information about the recipient, company or
others is used to make the email look more credible.
And It’s Getting Worse
The total number of
phishing attacks
increased 59 percent
from 2011 to 2012
In 2012-2013, 37.3 million
users worldwide were
subjected to
phishing.
Phishing In The News
A single victim of a phishing attack
can impact on millions.
The attack on the AP Twitter Account ha
a serious impact on the stock market.
Impact of the attack
on the stock market
No Company Is Immune!
Even security companies can fall victim.
What Can You Do?
1. Know the signs of a
phishing attack
2. Report phishing attacks
1. Generic greeting
2. Invokes fear
1
2
3. Requires action
3
4. Threating language
4
5
5. Grammar Issues
Common Phishing Traits
6. Generic Closing
6
DO hover over links
verify its location
DO NOT click on
unknown links
DO report the
suspected attack
DO NOT reply to
suspicious requests
4
What To Do
There’s More:
DO NOT rely on the “from” and “reply to” email
addresses as these can be faked
BE SUSPICIOUS of unsolicited attachments
CONFIRM information out of band. That is,
contact the sender on a known line, email,
website, or other method.
DO NOT use information in the email.
Phishing attacks are only limited to the
creativity of the attacker.
When In Doubt, Ask Your Security Office.
DO NOT CLICK, RESPOND, OR DOWNLOAD!

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Social engineering
Social engineering Social engineering
Social engineering
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Phishing
PhishingPhishing
Phishing
 
Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing
Teaching Your Staff About Phishing
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 

Ähnlich wie Phishing Awareness

ryan harris a day ago 404 wordsWhile I feel that any of the .docx
ryan harris  a day ago  404 wordsWhile I feel that any of the .docxryan harris  a day ago  404 wordsWhile I feel that any of the .docx
ryan harris a day ago 404 wordsWhile I feel that any of the .docx
gemaherd
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
Ken Spencer Brown
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
Symantec
 
Systems Thinking on a National Level, Part 2Drew David.docx
Systems Thinking on a National Level, Part 2Drew David.docxSystems Thinking on a National Level, Part 2Drew David.docx
Systems Thinking on a National Level, Part 2Drew David.docx
perryk1
 
Mimecast Threat Report
Mimecast Threat ReportMimecast Threat Report
Mimecast Threat Report
Chris Hewitt
 
Report_Business_Email_Threat_Report (1) (2) (1)
Report_Business_Email_Threat_Report (1) (2) (1)Report_Business_Email_Threat_Report (1) (2) (1)
Report_Business_Email_Threat_Report (1) (2) (1)
Xola Adons
 

Ähnlich wie Phishing Awareness (20)

ryan harris a day ago 404 wordsWhile I feel that any of the .docx
ryan harris  a day ago  404 wordsWhile I feel that any of the .docxryan harris  a day ago  404 wordsWhile I feel that any of the .docx
ryan harris a day ago 404 wordsWhile I feel that any of the .docx
 
Network
NetworkNetwork
Network
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
Keys to Network Security & Shocking Statistics
Keys to Network Security & Shocking StatisticsKeys to Network Security & Shocking Statistics
Keys to Network Security & Shocking Statistics
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...
A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...
A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Systems Thinking on a National Level, Part 2Drew David.docx
Systems Thinking on a National Level, Part 2Drew David.docxSystems Thinking on a National Level, Part 2Drew David.docx
Systems Thinking on a National Level, Part 2Drew David.docx
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
 
Mimecast Threat Report
Mimecast Threat ReportMimecast Threat Report
Mimecast Threat Report
 
Report_Business_Email_Threat_Report (1) (2) (1)
Report_Business_Email_Threat_Report (1) (2) (1)Report_Business_Email_Threat_Report (1) (2) (1)
Report_Business_Email_Threat_Report (1) (2) (1)
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
Stay safe online- understanding authentication methods
Stay safe online- understanding authentication methodsStay safe online- understanding authentication methods
Stay safe online- understanding authentication methods
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Phishing Awareness

  • 3. Phishing Is A Fake Email The long definition is that phishing is the act of attempting to acquire information such as usernames and passwords by masquerading as a trustworthy entity in an electronic communication.
  • 4. Is Phishing A Threat?
  • 5.
  • 6. 29% of security breaches involve social tactics, such as phishing
  • 7. Source: 2013 Verizon Data Breach Investigations Report 71% Phishing Is The Most Used Social Tactic
  • 8. 91% of targeted attacks use spear-phishing emails. Spear-Phishing is when detailed information about the recipient, company or others is used to make the email look more credible.
  • 10.
  • 11. The total number of phishing attacks increased 59 percent from 2011 to 2012
  • 12. In 2012-2013, 37.3 million users worldwide were subjected to phishing.
  • 14. A single victim of a phishing attack can impact on millions.
  • 15. The attack on the AP Twitter Account ha a serious impact on the stock market.
  • 16. Impact of the attack on the stock market
  • 17. No Company Is Immune! Even security companies can fall victim.
  • 19. 1. Know the signs of a phishing attack 2. Report phishing attacks
  • 20. 1. Generic greeting 2. Invokes fear 1 2 3. Requires action 3 4. Threating language 4 5 5. Grammar Issues Common Phishing Traits 6. Generic Closing 6
  • 21. DO hover over links verify its location DO NOT click on unknown links DO report the suspected attack DO NOT reply to suspicious requests 4 What To Do
  • 22. There’s More: DO NOT rely on the “from” and “reply to” email addresses as these can be faked BE SUSPICIOUS of unsolicited attachments CONFIRM information out of band. That is, contact the sender on a known line, email, website, or other method. DO NOT use information in the email.
  • 23. Phishing attacks are only limited to the creativity of the attacker. When In Doubt, Ask Your Security Office. DO NOT CLICK, RESPOND, OR DOWNLOAD!