Phishing 101.

Slides:



Advertisements
Similar presentations
THE DHS PHISHING IQ TEST PART 1 LEGITIMATE V PHISHING How do you know if an is legitimate, or is a phony, phishing ? Take the.
Advertisements

Social Engineering Training. Training Goals Increase Laboratory Awareness. Provide the tools required to identify, avoid and report advanced Social Engineering.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
I have attached a file to this by selecting the paperclip on the bottom of the page.
1 Kids on the Web. Child’s play? September, 2008.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Information Security Sharon Welna Information Security Officer.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
A Matter of Your Personal Security Phishing. Beware of Phishing s Several employees received an that looked legitimate, as if it was being.
Phishing Dennis Schmidt, CISSP Director, Office of Information Systems HIPAA Security Officer UNC School of Medicine UNC School of Medicine.
A Matter of Your Personal Security Phishing Revised 11/30/15.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Client Referral Process Online Store The Mississauga Furniture Bank mississaugafurniturebank.org.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Take the Quiz and find out more!
Important Information Provided by Information Technology Center
Objectives Define phishing and identify various types of phishing scams Recognize common baiting tactics used in phishing scams Examine real phishing messages.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Social Media Security: Understanding how to keep yourself safe.
An Introduction to Phishing and Viruses
Phishing, identity theft, and more
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Class Name: Online Safety & Privacy Basics
Identity theft vector of the electronic age
Unit 4 IT Security.
Information Security.
Lesson 3 Safe Computing.
Patient access Forgotten password
Report Phishing Forward phishing s to
Information Security 101 Richard Davis, Rob Laltrello.
Protect Your Computer Against Harmful Attacks!
Staying Austin College
Presented by: Brendan Walsh Manager, Security and Access Management
STOP. THINK. CONNECT. Online Safety Quiz.
Cybersecurity Awareness
Practice Safe Computing
Robert Leonard Information Security Manager Hamilton
Mary Kummer Jim McNall PRIMA Spring Training 2018
4 ways to stay safe online 1. Avoid viruses and phishing scams
Personal IT Security Cyber Security – Basic Steps
Content current as of: 20 November 2017
BuzzFeed’s Comprehensive Guide To Internet Safety (excerpts)
Phishing.
EARLY START PROGRAM, SUMMER 2017
Staying safe on the internet
DON’T GET HOOKED! YOU MAY BE UNAWARE BUT YOU ARE A PHISHING TARGET FOR CYBER CRIMINALS. A. Unknown sender address B. Offer too good to be true &
Report Phishing Forward phishing s to
Report Phishing Forward phishing s to
HOW DO I KEEP MY COMPUTER SAFE?
Protecting Senior Citizens from Phishing s
9 ways to avoid viruses and spyware
Phishing Don’t fall for fake
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
Social Engineering Humans are often the weakest point in security
MyLion Registration Website | Mobile device
Report Phishing Forward phishing s to
Why Cyber Security is important to SME? Useful Tips on how you protect and secure your business. By Ronald Soh from Win-Pro Consultancy Pte Ltd
Cybersecurity Simplified: Phishing
Presentation transcript:

Phishing 101

How can I protect myself against phishing? Prevention offers the first line of defense against cyberattacks. Learning how to identify phishing attempts is the first step in protecting yourself from them. Be Wary Plenty of phishing attempts may have spelling, grammar, or other glaring errors that can tip you off it’s a phish–but just as many don’t. Some of the most sophisticated phishing attempts will appear to come from people you trust. Be wary of emails that ask you to open a file, click on a link, or enter information into a form. Be especially careful of emails that ask you to enter your Access Account information. Remember: you wouldn’t give a stranger the keys to your apartment. When you give up your Access Account information, you’re doing the same thing to your digital space. Confirm Before You Click Use caution and trust your instincts. If an email seems suspicious, call the sender or email them directly. If you click on a phishing email “just to check” if it’s really from a friend, coworker or classmate, it may already be too late. Even clicking on that link can infect your system will malware or other malicious code. When in doubt, report it. You can always contact the OPP ITS HelpDesk (5-7197), submit an ITS HelpDesk Ticket or email OPPHelpDesk@psu.edu, if you have any concerns about a possible phishing email. Details Matter Sometimes, but not always, a phishing attempt will try to use information that they know about your organization to create a more authentic-sounding message. Read the message carefully and think about the style and tone: does it match how the sender would usually write? Does it use terms that your organization does not? For example, Penn State doesn’t refer to your Webaccess ID as your “PSU user name.” How can I protect myself against phishing?

How can I recognize a phish? Scammers continue to produce more and more sophisticated scams that very closely resemble information from trusted organizations. Although no two phishing attempts are alike, use these tips to help you recognize a phishing attempt: Suspect the unexpected: many phishing attempts include attachments or links that may appear unexpected to the user. For example, an attacker may send an invoice, a package delivery notice, etc. Ignore the call: many phishing emails contain a “call to action” (click on a link, download a file, provide user credentials, etc.). Don’t take action until you’re sure the sender is legitimate. If you are suspicious, confirm before you click: call or email the sender directly prior to taking any action, downloading any file, or providing any sensitive information.

Here are a couple phishing emails, with tips included, to help you recognize a PHISH.

Important Information Take a minute to watch this short video from Penn State’s Office of Information Security https://psu.app.box.com/v/phishing- digital-toolkit/folder/54967037768 To report a phishing email, please forward the message to phishing@psu.edu. For the latest phishing alerts please visit: https://phishing.psu.edu Important Information

Questions