Protecting Senior Citizens from Phishing s

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Welcome to eDMR This PowerPoint presentation is designed to show eDMR users how to login and begin using the eDMR system.
Welcome to the Online Employment Applicant Tutorial Click here for next screen.
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Industrial Process Learning Management System (LMS) User Guide How to self register, browse our course catalog, view our training schedule, and purchase.
UO Academic Extension Online Registration Instructions and help.
Center Accreditation Online System
Chapter Accreditation Online System Usage Tutorial Department of Member Relations & Grants National Children’s Alliance.
Booking Rules SLCM_AD_315 1 SLCM_AD_315 Booking Rules.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Career Services Center Employer Training. This is the main login page. The link can be found at Employers.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
USER SETUP. 2 This guide will show you how to add a new user or edit an existing one with Mifos X System How to add new user or edit an existing one?
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
To:Employee From: impersonated official company Message: Give us personal information here.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Introduction to Your OUSD and other district technology applications Leah Jensen, Instructional Technologist (510) (office), (510)
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Home NEW INNOVATIONS Medical Student Introduction NEW INNOVATIONS Medical Student Introduction This presentation includes the following topics: Login Notifications.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
On-Line BankCard Center Presentation Cardholder Role During the Presentation click the mouse on this button to move back a slide During the Presentation.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
1. On the homepage, click the “Register” link below the Login box in the left navigation bar. Registration Step 1.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
NEW! IT Helpdesk IT DEPARTMENT. What is Helpdesk? The helpdesk is a ticketing system which allows you to:  Submit tickets for IT support/service  Track.
Important Information Provided by Information Technology Center
Media education: from passive consumers to active creators
Digital Security Identity theft Copyright Laws Plagiarism, and More.
An Introduction to Phishing and Viruses
Web-based Information Science Education
EZ MESSENGER CUSTOMER portal training
PearsonAccess EOC Training
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Online Training Course
Using PCM Virtual Class
The Login Page is the first page your customers
CATALYST™ by Omnipress Training Guide CATALYST™ by Omnipress
Final Report.
Learn how to protect yourself against common attacks
Digital Citizenship Middle School
**Please view the instructional guide as a slideshow**
Lesson 3 Safe Computing.
Getting Started with SAM
Assess Survey Invitations
Elementary Student Instructional Guide
I S P S loss Prevention.
Parent Assistant Overview
Expense Report Training
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
How do I utilize EngradePro?
Cybersecurity Awareness
Unit4 Customer Portal Submitting & Managing Cases.
What is it? Why do I keep getting from Barracuda? SPAM.
SLCM_AD_315 Booking Rules
ISE Website Encourage International Service Employees to regularly check the website to view financial reports (e.g. payroll information), download.
How to complete a Referral Form via “Student” tab
Expense Report Training
How to Create and Start a Test Session
Expense Report Training
Computer Security.
Protection of Sensitive Information
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
Internet Safety – Social Media
Welcome to Grant Tracker!
Phishing 101.
Presentation transcript:

Protecting Senior Citizens from Phishing Emails Marcus Mickle mjmickle@vt.edu May 5, 2015

Introduction Email is a popular means of Internet communication. In order to protect your sensitive information while using email, it is important to learn how to avoid email scams.

Introduction (continued) This distance learning lesson is designed to introduce you to email safety rules, and provide you with helpful tips to identify and avoid email scams. Please remember to fill out the course evaluation at the end of the course.

Agenda Overview Vocabulary Instructional Goal Statement Course Objective What are phishing emails? Email Safety Rules

Agenda (continued) Identify and Avoid Phishing Practice Avoiding Phishing using the Phishing Scams game Summary Where to Get More Information Course Assessment Course Evaluation

Overview Email scams are an illegal attempt to steal your sensitive information including (social security numbers, credit card numbers, bank account numbers, and passwords) using email.

Vocabulary Glossary of terms: Attachments - a computer file that is part of the email. Links - highlighted words or images within the email that can be clicked to navigate directly to a Website. Phishing - an illegal attempt to steal your sensitive information using an email scam.

Vocabulary (continued) Glossary of terms: Pop-up messages – a message window that suddenly appears on the computer screen. Virus attack – a computer virus that spreads to the software on the computer and causes the computer to malfunction.

Instructional Goal Statement Senior citizens that are at least 65 years of age will be able to identify and avoid phishing emails using email safety rules.

Course Objectives At the end of the course you should be able to: Describe phishing emails. Identify five email safety rules. Identify and avoid phishing emails.

What will you learn today? What are phishing emails?

What are phishing emails? Phishing emails are when cybercriminals use fraudulent emails, links, attachments, and pop-up messages to look as if it is a legitimate business, to trick you into giving them your sensitive information.

What are phishing emails? An example of a phishing email: Dear Customer, (Notice that your name was not used.) This is a reminder to inform you that your account is pass due. To avoid interruption and to add funds to your account, logon to www.bankaccount.com. (Notice the link.) You have up to 4 hrs or your account will be closed. (Notice the threat to close your account).

What will you learn today? Five email safety rules.

Rule #1 – If you do not recognize Email safety rule #1 Rule #1 – If you do not recognize the sender of the email. DELETE the email.

Email safety rule #1 Please remember rule #1 I If you do not recognize the sender of the email. DELETE the email.

Rule #2 – Protect your personal Email safety rule #2 Rule #2 – Protect your personal information. DO NOT send personal information via email.

Email safety rule #2 Please remember rule #2 I Protect your personal information. DO NOT send personal information via email.

Rule #3 – Links in emails may take Email safety rule #3 Rule #3 – Links in emails may take you to the Website of cybercriminals. DO NOT click on any links within an email.

Email safety rule #3 Please remember rule #3 I Links in emails may take you to the Website of cybercriminals. DO NOT click on links within an email.

Rule #4 – Attachments in emails Email safety rule #4 Rule #4 – Attachments in emails may lead to a virus attack on your computer. DO NOT click on attachments within an email.

Email safety rule #4 Please remember rule #4 I Attachments in emails may be harmful to your computer. DO NOT click on attachments within an email.

Rule #5 – Pop-up messages in Email safety rule #5 Rule #5 – Pop-up messages in emails may lead to a virus attack on your computer. DO NOT click on pop-up messages within an email.

Email safety rule #5 Please remember rule #5 I Pop-up messages in emails may be harmful to your computer. DO NOT click on pop-up messages within an email.

What will you learn today? Identify phishing emails.

Identify phishing emails An email may appear to be from a legitimate business. The email may asks you to provide your personal information. Scam alert - Legitimate businesses never asks for personal information via an email or pop-up message. FGAC Business Profiles Validation (GTVFBPR) - used to define business profiles. FGAC Business Profile Assignments (GOAFBPR) - Assign users to the Business profile that will need to access data mask. Data Display Mask Columns Form (GORDMCL) – use this form to define the items that require protection of sensitive data on person search pages. Data Display Mask Rules Form (GORDMSK) – use this form to define the display masks applicable to the associated fields on SCT Banner forms.

Identify phishing emails Please remember Legitimate businesses do not asks for personal information via an email or pop-up message. FGAC Business Profiles Validation (GTVFBPR) - used to define business profiles. FGAC Business Profile Assignments (GOAFBPR) - Assign users to the Business profile that will need to access data mask. Data Display Mask Columns Form (GORDMCL) – use this form to define the items that require protection of sensitive data on person search pages. Data Display Mask Rules Form (GORDMSK) – use this form to define the display masks applicable to the associated fields on SCT Banner forms.

Identify phishing emails An email may appear to be from a legitimate business. The email may asks you click on a link to update your account. Scam Alert - Legitimate businesses will never asks you to update your account via an email link. FGAC Business Profiles Validation (GTVFBPR) - used to define business profiles. FGAC Business Profile Assignments (GOAFBPR) - Assign users to the Business profile that will need to access data mask. Data Display Mask Columns Form (GORDMCL) – use this form to define the items that require protection of sensitive data on person search pages. Data Display Mask Rules Form (GORDMSK) – use this form to define the display masks applicable to the associated fields on SCT Banner forms.

Identify phishing emails Please remember Legitimate businesses will not asks you to update your account via an email link. FGAC Business Profiles Validation (GTVFBPR) - used to define business profiles. FGAC Business Profile Assignments (GOAFBPR) - Assign users to the Business profile that will need to access data mask. Data Display Mask Columns Form (GORDMCL) – use this form to define the items that require protection of sensitive data on person search pages. Data Display Mask Rules Form (GORDMSK) – use this form to define the display masks applicable to the associated fields on SCT Banner forms.

Identify phishing emails An email may appear to be from a legitimate business. The email may asks you to click on a link to add funds to your account. Scam alert - Legitimate businesses never asks you to add funds to your account via an email or pop-up message. FGAC Business Profiles Validation (GTVFBPR) - used to define business profiles. FGAC Business Profile Assignments (GOAFBPR) - Assign users to the Business profile that will need to access data mask. Data Display Mask Columns Form (GORDMCL) – use this form to define the items that require protection of sensitive data on person search pages. Data Display Mask Rules Form (GORDMSK) – use this form to define the display masks applicable to the associated fields on SCT Banner forms.

Identify phishing emails Please remember Legitimate businesses do not asks you to add funds to your account via an email or pop-up message. FGAC Business Profiles Validation (GTVFBPR) - used to define business profiles. FGAC Business Profile Assignments (GOAFBPR) - Assign users to the Business profile that will need to access data mask. Data Display Mask Columns Form (GORDMCL) – use this form to define the items that require protection of sensitive data on person search pages. Data Display Mask Rules Form (GORDMSK) – use this form to define the display masks applicable to the associated fields on SCT Banner forms.

What will you learn today? Practice avoiding phishing emails.

Practice avoiding phishing scams Instructions: You will be taken to the FTC Website when you click the link below. Note: You must manually close the FTC Website window by clicking the X in the upper right corner after playing the game. Click here to practice avoiding phishing scams by playing the Phishing Scams game at the FTC Website. Source: United States Federal Trade Commission, www.ftc.gov

Summary Cybercriminals may attempt to use phishing emails as an illegal attempt to steal your sensitive information using fraudulent emails, links, attachments, and pop-up messages.

Summary Please remember that legitimate businesses never asks for sensitive information via email.

Where to Get More Information Instructions: You will be taken to the FTC Website when you click the link below. Note: You must manually close the FTC Website window by clicking the X in the upper right corner after viewing the information on it. Click here to view the consumer information about phishing at the FTC Website. Source: United States Federal Trade Commission, www.ftc.gov

Course assessment Please click here to complete the course assessment Instructions: You will be taken to the course assessment when you click the link below. Please click the submit button after you complete the assessment. Note: You must manually close the course assessment window by clicking the X in the upper right corner after completing the assessment. Please click here to complete the course assessment

Course evaluation Please click here to fill out the course evaluation. Instructions: You will be taken to the course evaluation when you click the link below. Please click the submit button after you complete the evaluation. Note: You must manually close the course evaluation window by clicking the X in the upper right corner after completing the evaluation. Please click here to fill out the course evaluation.

Thank you Please contact me at marcusm@vt.edu, if you have any questions. I hope that you enjoyed the course!