Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC

Slides:



Advertisements
Similar presentations
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Advertisements

Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
A Matter of Your Personal Security Phishing. Beware of Phishing s Several employees received an that looked legitimate, as if it was being.
What is Spam? d min.
A Matter of Your Personal Security Phishing Revised 11/30/15.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Important Information Provided by Information Technology Center
Objectives Define phishing and identify various types of phishing scams Recognize common baiting tactics used in phishing scams Examine real phishing messages.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Internet Safety.
Being Connected and Secure: Lessons for Everyday Computer Use
Chapter 40 Internet Security.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
What they are and how to protect against them
Edexcel GCSE Cyber security threats Computer Science 1CP1
Phishing, identity theft, and more
Introduction to Web Safety
System Access Authentication
Unit 4 IT Security.
ISYM 540 Current Topics in Information System Management
Lesson 3 Safe Computing.
Cyber Security & IT: What’s Next?
Cyber Security Awareness Workshop
Report Phishing Forward phishing s to
Cyber Security By: Pratik Gandhi.
Trends in Ransomware Distribution
Information Security 101 Richard Davis, Rob Laltrello.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Staying Austin College
Cybersecurity Awareness
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Practice Safe Computing
IT Security awareness Training.
Robert Leonard Information Security Manager Hamilton
Mary Kummer Jim McNall PRIMA Spring Training 2018
4 ways to stay safe online 1. Avoid viruses and phishing scams
- St. Clair County Network-
Risk of the Internet At Home
Scams and Schemes.
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
DON’T GET HOOKED! YOU MAY BE UNAWARE BUT YOU ARE A PHISHING TARGET FOR CYBER CRIMINALS. A. Unknown sender address B. Offer too good to be true &
Network Security Best Practices
Report Phishing Forward phishing s to
WannaCry Ransomware Overview
The information in this presentation is marked as:
HOW DO I KEEP MY COMPUTER SAFE?
9 ways to avoid viruses and spyware
How to keep the bad guys out and your data safe
The Internet: Encryption & Public Keys
What is Phishing? Pronounced “Fishing”
Phishing 101.
Marcial Quinones-Cardona
Why Cyber Security is important to SME? Useful Tips on how you protect and secure your business. By Ronald Soh from Win-Pro Consultancy Pte Ltd
Cybersecurity Simplified: Ransomware
Presentation transcript:

How to Recognize Fake Email Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

Why Do We Get Fake Emails? 97% of people cannot identify a sophisticated fake email People are the weakest security link in most business processes We can secure our networks, computers, systems, and internet access to make it more difficult to compromise information People making decisions on emails that request action is a manual process that cannot always be controlled It’s easier for hackers to use people to gather information and build schemes to get what they want © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

How to Recognize Fake Emails Legitimate companies do not send email requesting sensitive information Don’t trust the name in the from field of an email If it looks suspicious do not open the email Hover over links to see what address the link takes you Open a new browser window and type the website address directly into the browser rather than clicking on the link Most companies us secure web addresses identified by using https:// in the address bar instead of just http://  © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

How to Recognize Fake Emails Obvious grammar or spelling errors Strange message structures Generic greeting Urgent language Generic closing When in doubt, click the “Reply All” button This may reveal the true e-mail address Don’t click on email attachments Review the email signature Lack of details on contacting the company © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

Alarmist Email Social Engineering Do this or else Criminals try to create a sense of urgency so you’ll respond without thinking © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

Alarmist Email Social Engineering Do this or else Criminals try to create a sense of urgency so you’ll respond without thinking © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

Grammar/Spelling Issues Often times phishing messages have typos, grammatical errors, or extra characters © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

Examine Hyperlinks Hover over links Type into a browser to avoid subtle changes © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

What is Malware? Malware is an abbreviated term meaning “malicious software.” This is software that is specifically designed to gain access or damage a computer without the knowledge of the owner. There are several types of malware; Ransomware is a profitable criminal business, and its success lies in the way it develops the urgency using scare tactics. © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

What is Ransomware? Ransomware is a type of malicious software designed to block access to a computer system or mobile device until a sum of money is paid. Ransomware is also referred to “Cyber Extortion”. Two types of Ransomware; Locker - ransomware denies access to the computer or device. Crypto - ransomware prevents access to files or data. Ransomware is often spread through phishing emails that contain malicious attachments or when a user unknowingly visits an infected website and then malware is downloaded and installed without the user’s knowledge. © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

Recovery Options from Ransomware Restore the system or files and data from the last backup. Data lost since last backup Pay the ransom to receive an encryption key to unlock the files and data. Encourages more attacks © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

Phishing is Out of Control Phishing email is like the Wild West with no one holding crime accountable and we have to defend ourselves. © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

What to Do With These Emails DO NOT CLICK ON UNKNOWN LINKS OR ATTACHMENTS If you are not sure about the email, caution on the side of not opening the email Contact the ISO or a member of the IT Department to let them know about the email and they will let you know what to do with it © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

Response to Clicking on a Fake Email If you think you may have clicked on an email you shouldn’t have Call the IT department to let them know before it is too late to fix Do not click on other emails until the IT Department has cleared you to do so Create an environment that encourages acknowledging the mistake so the IT Department can address the issue quickly © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

Fake Email Risk IT only takes one compromise to get information ONE PERSON–ONE MOMENT–ONE OPPORTUNITY TODAY, ARE YOU GOING TO BE THAT ONE? © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

Presented by SBS CyberSecurity (605) 923-8722 sales@sbscyber.com www.sbscyber.com Let’s Connect! 700 S Washington Ave Ste 200, Madison, SD 57042 © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education