Reporting Phishing Incidents Heather Kimley June 13, 2012.

Slides:



Advertisements
Similar presentations
K12 WebMail
Advertisements

Working with Outlook 2007 at CERN Outlook Main window Customize views Send s Organize s: Category, Follow-up flag, To-Do Bar Create signatures.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
AO- 2 (part 2 of 2) Pass + Send. Receive. Reply. Forward. With more than 1 attachment.
Sterling Heights Public Library Agenda n We’ll learn how to “clean up” the computers n We’ll review how SLC’s mail system works n We’ll review SpamLion.
Electronic Mail CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Electronic Mail Name: ____________________ Class: ________________.
Surrey Public Library Electronic Classrooms Essentials.
GEtServices Contingent Staff Training For Suppliers Blanket Order.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
{ Etiquette Handbook. Feature Creating an Font, colour and sizes etc Sending an Sending using Cc Sending using Bcc Creating a signature.
Hearth Bulk System Divisional Secretaries’ Briefing 2012.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
evidence. Safety To stay safe on the internet there are many points you need to follow. The first point is to change your password regularly, you.
Quiz Review.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
GEtServices Contingent Staff Training For Suppliers.
Etiquette at MstreamIT. By Sam 1.  1. Title page.  2. Contents page.  3. Introduction.  4. Ways to access s.  5. Send to multiple contacts.
Encryption Cisco Ironport using Click here to begin Press the ‘F5’ Key to Begin.
Hunter Valley Amateur Beekeepers Forum User Guide Guide shows sample screenshots with most relevant actions. Website is at
1 Rapid Response System. 2 _Developed to notify account teams when the client was not happy with one or more service areas, such as cost management or.
Effective Microsoft Outlook Startup Receiving and Reading Using the Address Book Replying to Forwarding New messages from scratch.
Basics. 2 Professional Development Centre Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services.
Unit 2—Using the Computer Lesson 14 and Electronic Communication.
ICT Functional Skills Prepare an or add some contacts (This is always Question 4)
Dylan Bayliff. Contents: 1- Sending s & Using etiquette 2- Staying safe and Accessing 3- Open s 4- Replying to s 5- Setting up contacts.
Using . Creating and Sending Messages The Inbox view serves as Outlook’s interface Click the Inbox icon in the Outlook Bar or Folder List.
 Subject: The topic you are talking about. So they understand what it is a about and explain to the point.  clients usually display it in a.
The Online Activity Module User Account and Contact Us June 5, 2013.
Microsoft Outlook Objective The learner will be able to perform basic tasks in Microsoft Outlook 2003.
Outlook Web App Crash course. Outlook Agenda Login Login Reset Password Reset Password Getting Started in Outlook Web App Getting Started in Outlook Web.
How to Log-in to EPIC for the First Time. to FY 2015 Form 471 Authorized Signer Looks Like:
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
Introduction to Microsoft Outlook 2007 My Other Brother Software, LLC Darryl Geoffrey.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
etiquette. 1. language Use the right language because the will have to keep correcting your mistake and it will like better if you don’t misspell.
Configure the Server –Login to the Web-Based Server Manager Username “admin” Password – your password –You can change the.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 If you cannot locate an individual in order to add Bill to ID(s) or enable.
FTLOA Go to User Name: first last name lower case.
Enterprise Service Desk (ESD) Enterprise Service Desk for Notification / Knowledge Article Authors.
In this document I will explain what attachments are, why attachments are useful and a screen shot of the following showing how to add attachments.
Managing Your Inbox. Flagging Messages Message requires a specific response or action from the recipient Flagging draws attention to your request Quick.
Create a new then select the options tab. Setting high/low importance.
 Left Side  Mail/Contacts/Tasks  Labeled Folders  Contacts – “IM” Feature  Right Side  s.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Introduction to Your OUSD and other district technology applications Leah Jensen, Instructional Technologist (510) (office), (510)
Adding Contacts in Outlook. Follow these steps to begin building your contacts! By adding contacts in your Outlook, you will be able to develop an organized.
This opens the box as shown above where filtering on the Junk e mail folder can be adjusted. Click on the Blocked Senders tab. If adding an address.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
BSNL-Hungama SSA Portal – User Guide URL -
Your File System LIBS100 January 26, Word of the Day Network Administrator An information technology professional responsible for setting up, maintaining,
is short for electronic mail!. What is ? An electronic message sent from one computer to another. saves money and time compared to regular.
How to students in your class using Owl Link Updated
Outlook 2010 Just the basics!.
Automated Trip Approval
is short for electronic mail!
CS3015 Beacon Module 4 Messenger & Setting Preferences
Phishing...or What to Call It?
Fix AOL Mail Error Code 554 Call for Help
Fix Yahoo Mail Box Error 550 Call for Help
Demo Advanced Threat Protection
Reliance Supplier Corrective Action Process
Fastmail Password Recovery. Customer Service Number: For more details visit this link:
Technology ICT Option: .
Hearth Bulk System Divisional Secretaries Briefing 2011.
Requisition Approval Tracking Module
Technology ICT Option: .
Electronic Document Approval Overview
Social Engineering Humans are often the weakest point in security
Enrolling your new student at Moody ISD
Presentation transcript:

Reporting Phishing Incidents Heather Kimley June 13, 2012

Agenda  Reporting Spam/Phishing Incidents  Submitting as an Attachment  Actions by NOMAD for Phishing Issues  Actions by SOC for Phishing Issues  Final Notes

Where to Report Phishing Incidents  Send suspected spam to or to the "Spam Administrator" in the  Recipient of message is NOMAD Team.  All messages should be submitted as an attachment to preserve as much of the original message header information as possible.  Do not simply “forward” the spam

Submitting as an Attachment Outlook:  Open a new message  Use the Insert/Item option to attach the spam, or drag & drop the spam message into the new message  Send the message to the Spam Administrator Entourage:  Open up a new message  Drag & drop the spam message into the new message.  Send the message to the Spam Administrator Thunderbird:  Highlight the spam message  Select View/Headers/All  Forward the message to the Spam Administrator (Thunderbird Users: Do not use the “forward as an attachment” option. That method does not include needed header information.)

Actions by NOMAD for Phishing Issues  Validate recipient is a NOMAD user  Contact the SOC at  Block the sender at the NPFs if requested by the SOC  Put block in place on ProofPoint  Determine the number of users who received phishing message if requested by the SOC  Remove message from user inboxes if requested by the SOC Note: NOMAD does not contact the SOC about regular spam

Actions by SOC for Phishing Issues  Block URL at the firewall (prevent users who click the link in the message from reaching the phishing Website)  Send outreach notice (if deemed necessary) Note: If the SOC becomes aware of a phishing incident first, they will contact NOMAD.

Final Notes  Messages containing threats, requesting information (e.g. IP addresses) or are abusive (to you or NASA) should be sent to  The SOC receives s sent to  For more information including detailed examples of the difference between spam, phishing and abusive s, go to: