SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Phishing Awareness
What is Phishing?
Phishing Is A Fake Email
The long definition is that phishing is the act
of attempting to acquire information such as
usernames and passwords by masquerading
as a trustworthy entity in an electronic
communication.
Is Phishing A Threat?
29%
of security breaches involve
social tactics, such as phishing
Source: 2013 Verizon Data Breach Investigations Report
71%
Phishing Is The
Most Used
Social Tactic
91% of targeted attacks
use spear-phishing emails.
Spear-Phishing is when detailed information about the recipient, company or
others is used to make the email look more credible.
And It’s Getting Worse
The total number of
phishing attacks
increased 59 percent
from 2011 to 2012
In 2012-2013, 37.3 million
users worldwide were
subjected to
phishing.
Phishing In The News
A single victim of a phishing attack
can impact on millions.
The attack on the AP Twitter Account ha
a serious impact on the stock market.
Impact of the attack
on the stock market
No Company Is Immune!
Even security companies can fall victim.
What Can You Do?
1. Know the signs of a
phishing attack
2. Report phishing attacks
1. Generic greeting
2. Invokes fear
1
2
3. Requires action
3
4. Threating language
4
5
5. Grammar Issues
Common Phishing Traits
6. Generic Closing
6
DO hover over links
verify its location
DO NOT click on
unknown links
DO report the
suspected attack
DO NOT reply to
suspicious requests
4
What To Do
There’s More:
DO NOT rely on the “from” and “reply to” email
addresses as these can be faked
BE SUSPICIOUS of unsolicited attachments
CONFIRM information out of band. That is,
contact the sender on a known line, email,
website, or other method.
DO NOT use information in the email.
Phishing attacks are only limited to the
creativity of the attacker.
When In Doubt, Ask Your Security Office.
DO NOT CLICK, RESPOND, OR DOWNLOAD!

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness Training
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Phishing
PhishingPhishing
Phishing
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 

Ähnlich wie Phishing awareness

ryan harris a day ago 404 wordsWhile I feel that any of the .docx
ryan harris  a day ago  404 wordsWhile I feel that any of the .docxryan harris  a day ago  404 wordsWhile I feel that any of the .docx
ryan harris a day ago 404 wordsWhile I feel that any of the .docx
gemaherd
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
Ken Spencer Brown
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
Symantec
 
Systems Thinking on a National Level, Part 2Drew David.docx
Systems Thinking on a National Level, Part 2Drew David.docxSystems Thinking on a National Level, Part 2Drew David.docx
Systems Thinking on a National Level, Part 2Drew David.docx
perryk1
 
Mimecast Threat Report
Mimecast Threat ReportMimecast Threat Report
Mimecast Threat Report
Chris Hewitt
 
Report_Business_Email_Threat_Report (1) (2) (1)
Report_Business_Email_Threat_Report (1) (2) (1)Report_Business_Email_Threat_Report (1) (2) (1)
Report_Business_Email_Threat_Report (1) (2) (1)
Xola Adons
 

Ähnlich wie Phishing awareness (20)

ryan harris a day ago 404 wordsWhile I feel that any of the .docx
ryan harris  a day ago  404 wordsWhile I feel that any of the .docxryan harris  a day ago  404 wordsWhile I feel that any of the .docx
ryan harris a day ago 404 wordsWhile I feel that any of the .docx
 
Network
NetworkNetwork
Network
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
Keys to Network Security & Shocking Statistics
Keys to Network Security & Shocking StatisticsKeys to Network Security & Shocking Statistics
Keys to Network Security & Shocking Statistics
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...
A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...
A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Systems Thinking on a National Level, Part 2Drew David.docx
Systems Thinking on a National Level, Part 2Drew David.docxSystems Thinking on a National Level, Part 2Drew David.docx
Systems Thinking on a National Level, Part 2Drew David.docx
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
 
Mimecast Threat Report
Mimecast Threat ReportMimecast Threat Report
Mimecast Threat Report
 
Report_Business_Email_Threat_Report (1) (2) (1)
Report_Business_Email_Threat_Report (1) (2) (1)Report_Business_Email_Threat_Report (1) (2) (1)
Report_Business_Email_Threat_Report (1) (2) (1)
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
Stay safe online- understanding authentication methods
Stay safe online- understanding authentication methodsStay safe online- understanding authentication methods
Stay safe online- understanding authentication methods
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 

Kürzlich hochgeladen

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

Phishing awareness

  • 3. Phishing Is A Fake Email The long definition is that phishing is the act of attempting to acquire information such as usernames and passwords by masquerading as a trustworthy entity in an electronic communication.
  • 4. Is Phishing A Threat?
  • 5.
  • 6. 29% of security breaches involve social tactics, such as phishing
  • 7. Source: 2013 Verizon Data Breach Investigations Report 71% Phishing Is The Most Used Social Tactic
  • 8. 91% of targeted attacks use spear-phishing emails. Spear-Phishing is when detailed information about the recipient, company or others is used to make the email look more credible.
  • 10.
  • 11. The total number of phishing attacks increased 59 percent from 2011 to 2012
  • 12. In 2012-2013, 37.3 million users worldwide were subjected to phishing.
  • 14. A single victim of a phishing attack can impact on millions.
  • 15. The attack on the AP Twitter Account ha a serious impact on the stock market.
  • 16. Impact of the attack on the stock market
  • 17. No Company Is Immune! Even security companies can fall victim.
  • 19. 1. Know the signs of a phishing attack 2. Report phishing attacks
  • 20. 1. Generic greeting 2. Invokes fear 1 2 3. Requires action 3 4. Threating language 4 5 5. Grammar Issues Common Phishing Traits 6. Generic Closing 6
  • 21. DO hover over links verify its location DO NOT click on unknown links DO report the suspected attack DO NOT reply to suspicious requests 4 What To Do
  • 22. There’s More: DO NOT rely on the “from” and “reply to” email addresses as these can be faked BE SUSPICIOUS of unsolicited attachments CONFIRM information out of band. That is, contact the sender on a known line, email, website, or other method. DO NOT use information in the email.
  • 23. Phishing attacks are only limited to the creativity of the attacker. When In Doubt, Ask Your Security Office. DO NOT CLICK, RESPOND, OR DOWNLOAD!