Protecting Senior Citizens from Phishing Emails Marcus Mickle mjmickle@vt.edu May 5, 2015
Introduction Email is a popular means of Internet communication. In order to protect your sensitive information while using email, it is important to learn how to avoid email scams.
Introduction (continued) This distance learning lesson is designed to introduce you to email safety rules, and provide you with helpful tips to identify and avoid email scams. Please remember to fill out the course evaluation at the end of the course.
Agenda Overview Vocabulary Instructional Goal Statement Course Objective What are phishing emails? Email Safety Rules
Agenda (continued) Identify and Avoid Phishing Practice Avoiding Phishing using the Phishing Scams game Summary Where to Get More Information Course Assessment Course Evaluation
Overview Email scams are an illegal attempt to steal your sensitive information including (social security numbers, credit card numbers, bank account numbers, and passwords) using email.
Vocabulary Glossary of terms: Attachments - a computer file that is part of the email. Links - highlighted words or images within the email that can be clicked to navigate directly to a Website. Phishing - an illegal attempt to steal your sensitive information using an email scam.
Vocabulary (continued) Glossary of terms: Pop-up messages – a message window that suddenly appears on the computer screen. Virus attack – a computer virus that spreads to the software on the computer and causes the computer to malfunction.
Instructional Goal Statement Senior citizens that are at least 65 years of age will be able to identify and avoid phishing emails using email safety rules.
Course Objectives At the end of the course you should be able to: Describe phishing emails. Identify five email safety rules. Identify and avoid phishing emails.
What will you learn today? What are phishing emails?
What are phishing emails? Phishing emails are when cybercriminals use fraudulent emails, links, attachments, and pop-up messages to look as if it is a legitimate business, to trick you into giving them your sensitive information.
What are phishing emails? An example of a phishing email: Dear Customer, (Notice that your name was not used.) This is a reminder to inform you that your account is pass due. To avoid interruption and to add funds to your account, logon to www.bankaccount.com. (Notice the link.) You have up to 4 hrs or your account will be closed. (Notice the threat to close your account).
What will you learn today? Five email safety rules.
Rule #1 – If you do not recognize Email safety rule #1 Rule #1 – If you do not recognize the sender of the email. DELETE the email.
Email safety rule #1 Please remember rule #1 I If you do not recognize the sender of the email. DELETE the email.
Rule #2 – Protect your personal Email safety rule #2 Rule #2 – Protect your personal information. DO NOT send personal information via email.
Email safety rule #2 Please remember rule #2 I Protect your personal information. DO NOT send personal information via email.
Rule #3 – Links in emails may take Email safety rule #3 Rule #3 – Links in emails may take you to the Website of cybercriminals. DO NOT click on any links within an email.
Email safety rule #3 Please remember rule #3 I Links in emails may take you to the Website of cybercriminals. DO NOT click on links within an email.
Rule #4 – Attachments in emails Email safety rule #4 Rule #4 – Attachments in emails may lead to a virus attack on your computer. DO NOT click on attachments within an email.
Email safety rule #4 Please remember rule #4 I Attachments in emails may be harmful to your computer. DO NOT click on attachments within an email.
Rule #5 – Pop-up messages in Email safety rule #5 Rule #5 – Pop-up messages in emails may lead to a virus attack on your computer. DO NOT click on pop-up messages within an email.
Email safety rule #5 Please remember rule #5 I Pop-up messages in emails may be harmful to your computer. DO NOT click on pop-up messages within an email.
What will you learn today? Identify phishing emails.
Identify phishing emails An email may appear to be from a legitimate business. The email may asks you to provide your personal information. Scam alert - Legitimate businesses never asks for personal information via an email or pop-up message. FGAC Business Profiles Validation (GTVFBPR) - used to define business profiles. FGAC Business Profile Assignments (GOAFBPR) - Assign users to the Business profile that will need to access data mask. Data Display Mask Columns Form (GORDMCL) – use this form to define the items that require protection of sensitive data on person search pages. Data Display Mask Rules Form (GORDMSK) – use this form to define the display masks applicable to the associated fields on SCT Banner forms.
Identify phishing emails Please remember Legitimate businesses do not asks for personal information via an email or pop-up message. FGAC Business Profiles Validation (GTVFBPR) - used to define business profiles. FGAC Business Profile Assignments (GOAFBPR) - Assign users to the Business profile that will need to access data mask. Data Display Mask Columns Form (GORDMCL) – use this form to define the items that require protection of sensitive data on person search pages. Data Display Mask Rules Form (GORDMSK) – use this form to define the display masks applicable to the associated fields on SCT Banner forms.
Identify phishing emails An email may appear to be from a legitimate business. The email may asks you click on a link to update your account. Scam Alert - Legitimate businesses will never asks you to update your account via an email link. FGAC Business Profiles Validation (GTVFBPR) - used to define business profiles. FGAC Business Profile Assignments (GOAFBPR) - Assign users to the Business profile that will need to access data mask. Data Display Mask Columns Form (GORDMCL) – use this form to define the items that require protection of sensitive data on person search pages. Data Display Mask Rules Form (GORDMSK) – use this form to define the display masks applicable to the associated fields on SCT Banner forms.
Identify phishing emails Please remember Legitimate businesses will not asks you to update your account via an email link. FGAC Business Profiles Validation (GTVFBPR) - used to define business profiles. FGAC Business Profile Assignments (GOAFBPR) - Assign users to the Business profile that will need to access data mask. Data Display Mask Columns Form (GORDMCL) – use this form to define the items that require protection of sensitive data on person search pages. Data Display Mask Rules Form (GORDMSK) – use this form to define the display masks applicable to the associated fields on SCT Banner forms.
Identify phishing emails An email may appear to be from a legitimate business. The email may asks you to click on a link to add funds to your account. Scam alert - Legitimate businesses never asks you to add funds to your account via an email or pop-up message. FGAC Business Profiles Validation (GTVFBPR) - used to define business profiles. FGAC Business Profile Assignments (GOAFBPR) - Assign users to the Business profile that will need to access data mask. Data Display Mask Columns Form (GORDMCL) – use this form to define the items that require protection of sensitive data on person search pages. Data Display Mask Rules Form (GORDMSK) – use this form to define the display masks applicable to the associated fields on SCT Banner forms.
Identify phishing emails Please remember Legitimate businesses do not asks you to add funds to your account via an email or pop-up message. FGAC Business Profiles Validation (GTVFBPR) - used to define business profiles. FGAC Business Profile Assignments (GOAFBPR) - Assign users to the Business profile that will need to access data mask. Data Display Mask Columns Form (GORDMCL) – use this form to define the items that require protection of sensitive data on person search pages. Data Display Mask Rules Form (GORDMSK) – use this form to define the display masks applicable to the associated fields on SCT Banner forms.
What will you learn today? Practice avoiding phishing emails.
Practice avoiding phishing scams Instructions: You will be taken to the FTC Website when you click the link below. Note: You must manually close the FTC Website window by clicking the X in the upper right corner after playing the game. Click here to practice avoiding phishing scams by playing the Phishing Scams game at the FTC Website. Source: United States Federal Trade Commission, www.ftc.gov
Summary Cybercriminals may attempt to use phishing emails as an illegal attempt to steal your sensitive information using fraudulent emails, links, attachments, and pop-up messages.
Summary Please remember that legitimate businesses never asks for sensitive information via email.
Where to Get More Information Instructions: You will be taken to the FTC Website when you click the link below. Note: You must manually close the FTC Website window by clicking the X in the upper right corner after viewing the information on it. Click here to view the consumer information about phishing at the FTC Website. Source: United States Federal Trade Commission, www.ftc.gov
Course assessment Please click here to complete the course assessment Instructions: You will be taken to the course assessment when you click the link below. Please click the submit button after you complete the assessment. Note: You must manually close the course assessment window by clicking the X in the upper right corner after completing the assessment. Please click here to complete the course assessment
Course evaluation Please click here to fill out the course evaluation. Instructions: You will be taken to the course evaluation when you click the link below. Please click the submit button after you complete the evaluation. Note: You must manually close the course evaluation window by clicking the X in the upper right corner after completing the evaluation. Please click here to fill out the course evaluation.
Thank you Please contact me at marcusm@vt.edu, if you have any questions. I hope that you enjoyed the course!