Louisiana State University

Slides:



Advertisements
Similar presentations
Internet Safety at Work Protect company, customer, and your data online.
Advertisements

ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
What is identity theft, and how can you protect yourself from it?
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Information Security Phishing Update CTC
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
TITLE : E-SAFETY NAME : ABDUL HAFIQ ISKANDAR BIN ROZLAN PROGRAM : SR221 NO.STUDENT :
1 Kids on the Web. Child’s play? September, 2008.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
A Matter of Your Personal Security Phishing. Beware of Phishing s Several employees received an that looked legitimate, as if it was being.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
A Matter of Your Personal Security Phishing Revised 11/30/15.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Objectives Define phishing and identify various types of phishing scams Recognize common baiting tactics used in phishing scams Examine real phishing messages.
Internet Safety.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Mrs. Esman Computer Special
Phishing, identity theft, and more
Done by… Hanoof Al-Khaldi Information Assurance
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Identity theft vector of the electronic age
Unit 4 IT Security.
Digital Citizenship Middle School
Protecting What’s Yours: Your Identity
Information Security.
Overview 1. Phishing Scams
Cyber Security Awareness Workshop
Report Phishing Forward phishing s to
Cyber Security Awareness Workshop
How to Protect Yourself from ID Theft and Social Engineering
Staying Austin College
Cybersecurity Awareness
Practice Safe Computing
IT Security awareness Training.
Robert Leonard Information Security Manager Hamilton
Mary Kummer Jim McNall PRIMA Spring Training 2018
Topics Passwords – Password policy, How to change password
4 ways to stay safe online 1. Avoid viruses and phishing scams
Risk of the Internet At Home
Technology Services Multi-Factor Authentication gsw
Curating an Effective Security Culture
What you can do to support people to be safe online
Navigating Security Seas in a Small Ship with a Limited Crew
Safer computing week Create, connect and share respect.
R E A D What is cyber bullying? Hall
Report Phishing Forward phishing s to
Epic Introduction Basics
Security Hardening through Awareness August 2018
Lesson 2: Epic Security Considerations
Epic Introduction Basics
Being Aware of What You Share
Welcome to Liscio, our new client communication platform.
Information Security.
Phishing 101.
Cybersecurity Simplified: Phishing
Cybersecurity Simplified: Ransomware
Information Security in Your Office
Defencebyte THE PERFECT SECURITY FOR YOUR COMPUTER.
Presentation transcript:

Louisiana State University Phishing 2017 Louisiana State University

The Phishing Landscape Globally, the rate of phishing increased 250% in Q1 2016, and is still rising (source: SC Media) Why is LSU being targeted? Who is doing this? What are they after? W-2’s, to change direct deposit information, spawn more phish internally, intellectual property, personally identifying information for identity theft Alternatively, they want to install Ransomware and extort money

The Phishing Landscape Have University systems been hacked? Why can’t the University block phishing emails? The “Problem” Email is an inherently trusted form of communication And, …. it is a severely misplaced trust

Compromise of Credentials (Logon/Password) How does it happen? Phishing emails - that scare or coax you into providing information Malware on computers, mobile devices Logging on to University systems from questionable computers, devices, or networks

What is the University doing? Blocking malicious links contained in Phishing emails from campus This does not protect you at home or off campus Scanning change logs for suspicious changes to employee information Timing is part of the attack profile for hackers. They are trying to time their attacks with University processes Email filtering Working towards the implementation of two factor authentication to access University systems Two factor: Something you know; something you have; something you are Working to implement annual security awareness training for employees Looking at “self-phishing” strategies tied to awareness education Deploying a new “Phish Tank” Web page to inform the community on phish that have been discovered or reported www.lsu.edu/phishing

What can we individually do about it? Be paranoid of anything that talks about money, asks for personal information, or contains a Web link Cursor over Web links and read them in their entirety. If something smells rotten, it probably is…… Log in to computer systems directly rather than clicking on a link in an email. Don’t be in a hurry to click on attachments, especially something you didn’t ask for, or not expecting to receive Jealously guard your personal information Be as protective of your personal information such as SSN, date of birth, drivers license number as you would your purse or wallet Think twice, and a third and fourth time before entering personal information into online forms

What can we individually do about it? Watch for misspellings and other formatting errors The problem is that the quality of phish has increased along with the quantity Again, cursor over Web links. If something doesn’t feel quite right with an email, DO NOTHING Get help from your department’s IT staff or contact the ITS Help Desk If you have suspicions about an email, ask another person to look at it with you. Report Phishing messages to security@lsu.edu

The End Questions / Discussion