If I’d only known then what I know now about phishing…

Slides:



Advertisements
Similar presentations
PayPal Phishing Example. Can you tell which is real? 1. 2.
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
“You Really Can Stay One Step Ahead of The Bad Guys” Presented by: Keystone Computer Concepts Inc.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Practical skills for securing a computer (NONTECHNICAL) Rebecca Gould, Director and Professor iTAC October 4, 2006.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Computer Basics. Computers & Peripherals Safety on the Web Security Software Firewall Antivirus Software Norton Antivirus McAffee Antivirus Security.
INTERNET SAFETY FOR STUDENTS
November 2009 Secure Data Transmission May 2014 What are Secure Methods of Transmission? Encrypted Services Encrypted Memory Sticks Fax Secure.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
Scams & Schemes Common Sense Media.
Spam Act 2003 Consumer Education and Awareness. About the ACA Independent government regulator Ensures industry compliance with legislation (Telecommunications.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
CCT355H5 F Presentation: Phishing November Jennifer Li.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
And more……. ‘Leadership and communication are inseparable. You can’t have one without the other.’ ---Claude I. Taylor.
Phishing Dennis Schmidt, CISSP Director, Office of Information Systems HIPAA Security Officer UNC School of Medicine UNC School of Medicine.
Now scroll to move on to the next slide. What is e-safety? E-safety is keeping safe when you are online. It means: Not giving out personal information.
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
By Liam Wright Manga comic group Japan SAFETY on your computer.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Phishing and online fraud What parents need to know.
 The overall objective is for the student to establish and begin using a secondary account utilizing Gmail’s web based system COURSE OBJECTIVES.
, IM, and File sharing specialist By: Sophie Gordon.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Managing Money Workshop The National Autistic Society AGM
Jeff loses his identity! Lesson 5: Identity Theft.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
In this tutorial, you will be shown security considerations that you should keep in mind while accessing or using any GW systems, including GWeb. Remember.
Internet Safety.
Fraud Protection.
Fraud protection.
Phishing, identity theft, and more
Introduction to Web Safety
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
CS101 Security.
TODAY is World Smile Day can be celebrated by a single individual without any attention or fanfare by simply doing an act of kindness and helping.
Passwords & Behavioral Ads
Cybersecurity Awareness
Scams and Schemes.
Personal IT Security Cyber Security – Basic Steps
Phishing.
Cyber Self-Defense Lesson Plan
DON’T GET HOOKED! YOU MAY BE UNAWARE BUT YOU ARE A PHISHING TARGET FOR CYBER CRIMINALS. A. Unknown sender address B. Offer too good to be true &
CS101 Security.
Introductions November 2018
what I know now about passwords…
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
STAYING SAFE ON THE INTERNET
If I’d only known then what I know now about file sharing…
Social Engineering Humans are often the weakest point in security
InformatiOn Technology Services
What is Phishing? Pronounced “Fishing”
Phishing 101.
Phishing Don’t get caught!.
CS101 Security.
Phishing Don’t get caught!.
Presentation transcript:

If I’d only known then what I know now about phishing… I got scammed! I replied to an email from “MIT Support Team” asking me to verify my email account information. If I’d only known then what I know now about phishing…

MIT (and legitimate businesses) will NEVER ask for passwords. Do not reply to any email message asking for personal information.

Know how to identify a phishing email: Clues: bad grammar, typos, strange-looking web links. If the offer sounds too good or strange to be true, it is.

DON’T GET “PHISHED” For more tips on safe email practices, go to: web.mit.edu/security

Security Awareness Day! To learn more about safe computing at MIT, join us for Security Awareness Day! Wed, November 5 2:00 – 5:00 p.m. Bartos Theater (E15 Media Lab)