Cybersecurity Simplified: Phishing

Slides:



Advertisements
Similar presentations
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Advertisements

What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Breaking Trust On The Internet
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Information Security Phishing Update CTC
Director of Research, SANS Institute
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
BUSINESS B1 Information Security.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Information Security Sharon Welna Information Security Officer.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Sky Advanced Threat Prevention
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Understanding and breaking the cyber kill chain
Important Information Provided by Information Technology Center
Objectives Define phishing and identify various types of phishing scams Recognize common baiting tactics used in phishing scams Examine real phishing messages.
BUILD SECURE PRODUCTS AND SERVICES
Deployment Planning Services
Trend Micro Consumer 2010 Easy. Fast. Smart.
Exchange Online Advanced Threat Protection
Done by… Hanoof Al-Khaldi Information Assurance
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Phishing Don’t take the bait! Dave Beauvais Andrew Sloan
CYBER SECURITY PANDEMIC
Learn how to protect yourself against common attacks
Cisco 2017 Security Annual Report
Don’t get phished!, recognize the bait
Lesson 3 Safe Computing.
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
I S P S loss Prevention.
Microsoft Ignite /20/2018 8:09 AM BRK3023
Report Phishing Forward phishing s to
Information Security 101 Richard Davis, Rob Laltrello.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Bird Team Lead, Account Executive.
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
Complete Cloud Security
Presented by: Brendan Walsh Manager, Security and Access Management
Exchange Online Advanced Threat Protection
Demo Advanced Threat Protection
Cybersecurity Awareness
Robert Leonard Information Security Manager Hamilton
4 ways to stay safe online 1. Avoid viruses and phishing scams
Information Security Session October 24, 2005
What is it? Why do I keep getting from Barracuda? SPAM.
Real World Advanced Threat Protection
Report Phishing Forward phishing s to
Security Hardening through Awareness August 2018
Social Engineering Humans are often the weakest point in security
What is Phishing? Pronounced “Fishing”
Spear Phishing Awareness
Dark Web Domain Status Report
Microsoft Data Insights Summit
Phishing 101.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Introduction to Symantec Security Service
Cybersecurity Simplified: Ransomware
Presentation transcript:

Cybersecurity Simplified: Phishing Phishing is a form of fraud in which an attacker masquerades as a reputable person or company in email or other electronic communication channels. A common phishing tactic is to send an email with a forged return address, so that the message appears to have originated from a legitimate source, making it more likely that the recipient will open it.   Phishing attacks are popular with cybercriminals, because it is easier to trick someone into clicking a malicious link in a seemingly legitimate email than it is to break through a computer’s defenses. Examples of phishing schemes An employee receives an email from her company’s CEO, asking her to buy electronic gift cards for a customer recognition event. The request is time sensitive so she quickly purchases these online and sends the gift card numbers to the CEO. Weeks later she discovers the CEO never made the request. An employee receives an email with a link to a secure document. They enter their credentials to view the document, but the document fails to load. They move on to other work and forget about the glitch. In reality, they have delivered their username and password to hackers, who can now use it to access their email and other online accounts, including systems and data used by your company. Phishing email detections increased 250% from January to December 2018 worldwide. Source: Microsoft Security Intelligence Report Volume 24, February 28, 2019 Microsoft 365 Business helps protect you against phishing attacks Most cloud email services include some protections against phishing through basic spam filtering. Microsoft 365 Business adds sophisticated technologies that provide an additional level of protection: Time of click protection against malicious links: cybercriminals sometimes redirect seemingly safe links to unsafe sites using a forwarding service hours or days after a message is delivered. To help ensure continuous protection, each time a link is clicked, it is checked in real-time, and the destination is blocked if it is known to be malicious. URL detonation: When a user clicks a link that has an unknown reputation, the system checks the destination for patterns of suspicious behavior in a secure “sandbox.” While this scanning is happening, users see the message ”this link is being scanned.” If the link is identified as malicious after the scan, the user is warned against opening it. Anti-spoofing technology uses machine learning and advanced analysis techniques to identify signs than an email sender may not be who they appear to be. If impersonation is detected the email is blocked or moved to junk mail. Multi-factor authentication helps keep attackers out of your environment even if a phishing attack results in a compromised password. Advanced multi-factor authentication gives you the ability to configure trusted locations such as an office network and block access from countries where you aren’t conducting business. Microsoft’s commitment to enhancing security technology The anti-phishing and anti-malware capabilities included in Microsoft 365 Business are called Office 365 Advanced Threat Protection (ATP). This is the same technology used to protect many of the world’s largest companies. Threats rapidly evolve, so we continue to invest in expanding capabilities to help secure mailboxes from attacks. Microsoft uses artificial intelligence to identify and protect against emerging threats in real-time. Our machine learning models leverage Microsoft’s wide network of threat intelligence, plus seasoned threat experts who have deep understanding of malware, cyberattacks, and attacker motivation, to combat a wide range of attacks.   Office 365 ATP also shares threat signals with other defenses and sensors within Microsoft. For example, when a malicious file is detected by Microsoft Defender, that threat can also be blocked by Office 365 ATP. Connecting security data and systems allows Microsoft security technologies to continuously improve threat protection. Get started: Learn more about Microsoft 365 Business at www.microsoft.com/microsoft365/business