Phishing awareness
-
Upload
phishingbox -
Category
Education
-
view
613 -
download
2
description
Transcript of Phishing awareness
![Page 1: Phishing awareness](https://reader033.fdocuments.net/reader033/viewer/2022061303/54931954b47959794d8b4785/html5/thumbnails/1.jpg)
Phishing Awareness
![Page 2: Phishing awareness](https://reader033.fdocuments.net/reader033/viewer/2022061303/54931954b47959794d8b4785/html5/thumbnails/2.jpg)
What is Phishing?
![Page 3: Phishing awareness](https://reader033.fdocuments.net/reader033/viewer/2022061303/54931954b47959794d8b4785/html5/thumbnails/3.jpg)
Phishing Is A Fake Email
The long definition is that phishing is the act of attempting to acquire information such as usernames and passwords by masquerading as a trustworthy entity in an electronic communication.
![Page 4: Phishing awareness](https://reader033.fdocuments.net/reader033/viewer/2022061303/54931954b47959794d8b4785/html5/thumbnails/4.jpg)
Is Phishing A Threat?
![Page 5: Phishing awareness](https://reader033.fdocuments.net/reader033/viewer/2022061303/54931954b47959794d8b4785/html5/thumbnails/5.jpg)
![Page 6: Phishing awareness](https://reader033.fdocuments.net/reader033/viewer/2022061303/54931954b47959794d8b4785/html5/thumbnails/6.jpg)
29%of security breaches involve social tactics, such as phishing
![Page 7: Phishing awareness](https://reader033.fdocuments.net/reader033/viewer/2022061303/54931954b47959794d8b4785/html5/thumbnails/7.jpg)
Source: 2013 Verizon Data Breach Investigations Report
71%
Phishing Is The Most Used Social Tactic
![Page 8: Phishing awareness](https://reader033.fdocuments.net/reader033/viewer/2022061303/54931954b47959794d8b4785/html5/thumbnails/8.jpg)
91% of targeted attacks use spear-phishing emails.
Spear-Phishing is when detailed information about the recipient, company or others is used to make the email look more credible.
![Page 9: Phishing awareness](https://reader033.fdocuments.net/reader033/viewer/2022061303/54931954b47959794d8b4785/html5/thumbnails/9.jpg)
And It’s Getting Worse
![Page 10: Phishing awareness](https://reader033.fdocuments.net/reader033/viewer/2022061303/54931954b47959794d8b4785/html5/thumbnails/10.jpg)
Phishing Is On The Rise
![Page 11: Phishing awareness](https://reader033.fdocuments.net/reader033/viewer/2022061303/54931954b47959794d8b4785/html5/thumbnails/11.jpg)
The total number of phishing attacksincreased 59 percentfrom 2011 to 2012
![Page 12: Phishing awareness](https://reader033.fdocuments.net/reader033/viewer/2022061303/54931954b47959794d8b4785/html5/thumbnails/12.jpg)
In 2012-2013, 37.3 million users worldwide were subjected tophishing.
![Page 13: Phishing awareness](https://reader033.fdocuments.net/reader033/viewer/2022061303/54931954b47959794d8b4785/html5/thumbnails/13.jpg)
Phishing In The News
![Page 14: Phishing awareness](https://reader033.fdocuments.net/reader033/viewer/2022061303/54931954b47959794d8b4785/html5/thumbnails/14.jpg)
A single victim of a phishing attack can impact on millions.
![Page 15: Phishing awareness](https://reader033.fdocuments.net/reader033/viewer/2022061303/54931954b47959794d8b4785/html5/thumbnails/15.jpg)
The attack on the AP Twitter Account has a serious impact on the stock market.
![Page 16: Phishing awareness](https://reader033.fdocuments.net/reader033/viewer/2022061303/54931954b47959794d8b4785/html5/thumbnails/16.jpg)
Impact of the attack on the stock market
![Page 17: Phishing awareness](https://reader033.fdocuments.net/reader033/viewer/2022061303/54931954b47959794d8b4785/html5/thumbnails/17.jpg)
No Company Is Immune!Even security companies can fall victim.
![Page 18: Phishing awareness](https://reader033.fdocuments.net/reader033/viewer/2022061303/54931954b47959794d8b4785/html5/thumbnails/18.jpg)
What Can You Do?
![Page 19: Phishing awareness](https://reader033.fdocuments.net/reader033/viewer/2022061303/54931954b47959794d8b4785/html5/thumbnails/19.jpg)
1. Know the signs of a phishing attack
2. Report phishing attacks
![Page 20: Phishing awareness](https://reader033.fdocuments.net/reader033/viewer/2022061303/54931954b47959794d8b4785/html5/thumbnails/20.jpg)
1. Generic greeting
2. Invokes fear
1
2
3. Requires action3
4. Threating language4
55. Grammar Issues
Common Phishing Traits
6. Generic Closing6
![Page 21: Phishing awareness](https://reader033.fdocuments.net/reader033/viewer/2022061303/54931954b47959794d8b4785/html5/thumbnails/21.jpg)
DO hover over links verify its location
DO NOT click on unknown links
DO report the suspected attack
DO NOT reply to suspicious requests
4
What To Do
![Page 22: Phishing awareness](https://reader033.fdocuments.net/reader033/viewer/2022061303/54931954b47959794d8b4785/html5/thumbnails/22.jpg)
There’s More:DO NOT rely on the “from” and “reply to” email addresses as these can be faked
BE SUCPSIOUS of unsolicited attachments
CONFIRM information out of band. That is, contact the sender on a known line, email, website, or other method.
DO NOT use information in the email.
![Page 23: Phishing awareness](https://reader033.fdocuments.net/reader033/viewer/2022061303/54931954b47959794d8b4785/html5/thumbnails/23.jpg)
Phishing attacks are only limited to the creativity of the attacker.
When In Doubt, Ask Your Security Office.DO NOT CLICK, RESPOND, OR DOWNLOAD!