Report Phishing Forward phishing emails to phishing@harvard.edu.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Your NEW Social Services Verification Tool
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Threats to I.T Internet security By Cameron Mundy.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
Commercial eSecurity Training and Awareness. Common Online Threats Most electronic fraud falls into one of three categories:  PHISHING – Fraudulent s.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
IT security By Tilly Gerlack.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
What is Spam? d min.
Don’t send offensive pictures  This can badly offend people in many ways or they could take you to court and may get charged. Also it is illegal to send.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Windows Vista Configuration MCTS : Productivity Applications.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Safe Computing Protect your electronic profile means protecting You and Case Information Security Office, ITS Case Western Reserve University 2015 Information.
Important Information Provided by Information Technology Center
Internet Safety.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Media education: from passive consumers to active creators
Digital Security Identity theft Copyright Laws Plagiarism, and More.
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Learn how to protect yourself against common attacks
links and attachments: Help stop malware from spreading
CS101 Security.
Lesson 3 Safe Computing.
National Cyber Security Month
Report Phishing Forward phishing s to
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Unit 4 IT Security.
Presented by: Brendan Walsh Manager, Security and Access Management
Cybersecurity Awareness
Practice Safe Computing
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
4 ways to stay safe online 1. Avoid viruses and phishing scams
Risk of the Internet At Home
Treasurer’s Workshop January 20, 2018
Scams and Schemes.
Protecting Your Identity:
European Championships 2017
Dear Students,   The school holidays are just around the corner. When spending time online during the school holidays, you should be aware of good practices.
My House My Rules.
Report Phishing Forward phishing s to
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Anatomy of a Large Scale Attack
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
Unit 1 Fundamentals of IT
Who am I?. Information Security and You: Identity Theft and Credit Card Encryption.
Phishing 101.
Report Phishing Forward phishing s to
Communicating in the IT Industry
Cybersecurity Simplified: Phishing
Presentation transcript:

Report Phishing Forward phishing emails to phishing@harvard.edu

What is it? Why phishing? What can I do?

Phishing is the most common way attackers illegally access systems.

A phishing message is designed to trick you Into doing one of these four things. Click Here! USERNAME ************ Click an Unsafe Link Open an Unsafe File Type your Password Transfer Money

Cyber attackers phish for different reasons, But they all phish.

Cyber attackers phish for different reasons, But they all phish. Criminals Intelligence Hacktivists Money Fraud Identity Theft Sensitive Data Network Access Infrastructure Public Web Pages Social Media

Phishing messages are designed to get you to react quickly without thinking too much.

Phishing messages are designed to get you to react quickly without thinking too much. Sense of Urgency Offers of Money Confirmations Odd Requests Rewards IT Support

What happens when I get a phishing email?

What happens when I get a phishing email? Report Click Delete

What happens if I click? (1/2) Identity Theft Data Leak Data Destruction Account Takeover Password Stolen

What happens if I click? (2/2) Stolen Password Ransomware Remote Access Network Compromise Malware Installed

What happens if I Delete? You’re Safe…

What happens if I Delete? Deleting keeps you safe from cyber attackers. Reporting keeps you safe from your coworkers. You’re Safe…for now.

What happens if I report? Review Links Block Domains Check Accounts Remove Messages “When you report a phish, we review it and take appropriate actions based on risk.”   "No harm, no foul if the email message wasn't phishing." "Forward to phishing account, not to your friends. Never send malicious links or malware to others."

If you aren’t sure… Or Skip the Link, Go to The Source Ignore the File Please Or Click Here To Confirm. Skip the Link, Ignore the File Go to The Source

Forward phishing emails to phishing@harvard.edu In Closing: Forward phishing emails to phishing@harvard.edu Not sure? Go to the source. Closing Phishing is a significant risk, so If you get a phishing message, report it. If you’re not sure- go to the source

Let’s Practice! Closing Phishing is a significant risk, so If you get a phishing message, report it. If you’re not sure- go to the source

#1 The Wire Transfer Rebecca Requestersen Francine Moneybags Transfer Problem Hello Francine, I am trying to get payment to a vendor. It is important they get paid by close of business. Can you please wire 7,540 to… Closing Phishing is a significant risk, so If you get a phishing message, report it. If you’re not sure- go to the source

#2 The IT Support Alert IT Help Wendel Windowson Suspicious Activity Hello Wendel, Your computer has been infected with the RealBad2.0 Malware that you saw on the news. You must to use our scan Within 12 hours. Closing Phishing is a significant risk, so If you get a phishing message, report it. If you’re not sure- go to the source Click Here

#3 Confirm Now! Super Shoppers, LLC Sonia Shopper Package Damaged Dear Sonia, We apologize in advance, but your recent order was damaged in delivery. We are unable to issue a refund until you confirm Account details Closing Phishing is a significant risk, so If you get a phishing message, report it. If you’re not sure- go to the source with this form.

CrazyMail Secure Reset Security@CrazyMail.Net Malia Mailer #4 Password Reset Password Compromise Dear Malia, Your account has been locked due to potential compromise. You must go to this site to secure your account. Closing Phishing is a significant risk, so If you get a phishing message, report it. If you’re not sure- go to the source CrazyMail Secure Reset

#5 Cry for Help N.Trouble@g.Harvard.edu Gary Goodegg HELP!!! HI, I need to submit this file for class but it won’t open on my computer. Can you PLEASE (!) save it as a PDF and send to me??? Closing Phishing is a significant risk, so If you get a phishing message, report it. If you’re not sure- go to the source

#6 Attach And Attack eFaxService@proserv.ly Sandy Scanner Your efax Premium User, Your electronic fax is attached. This file is intended only for the recipient and is considered confidential. Closing Phishing is a significant risk, so If you get a phishing message, report it. If you’re not sure- go to the source This is not my document.