To:Employee From: impersonated official company Message: Give us personal information here.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

PowerPoint 1: fraud/ phishing Lesson 2-2. WHAT IS PHISHING?
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
1 Online Self-Defense: Avoiding Scams Chau Mai December 5, 2013.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Protecting Your Identity: What to Know, What to Do Sherry Daniels Family Living Educator Portage County UW Extension 1462 Strongs Ave., Stevens Point,
Module 5: financial services review
Protecting Your Identity: What to Know, What to Do.
1 Identity Theft and Phishing: What You Need to Know.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
What is identity theft, and how can you protect yourself from it?
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
1 What is Phishing? …listening to music by the band called Phish or perhaps …a hobby, sport or recreation involving the ocean, rivers or streams…nope.
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Internet Fraud By Jessica Habermehl &Ally Erwine Period 9.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
1 Begin the E Signature Process Here. 2 OPTION 1: Send a secure to the Insured to E-Sign and Pay Online This is a copy of the your Insured.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
 More than ___% of teens have a savings account.  ___% of teens age have a checking account. ___% of those ages have one.  Likewise, ___%
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Scams & Schemes Common Sense Media.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Jeff loses his identity! Lesson 8: Identity Theft.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
On-Line BankCard Center Presentation Cardholder Role During the Presentation click the mouse on this button to move back a slide During the Presentation.
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
Mobile Money 1/37 Fiserv Mobile Money Staff Education © 2010 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. All trademarks.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
Jeff loses his identity! Lesson 5: Identity Theft.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Learn how to protect yourself against common attacks
Attention Identity theft Definition
Digital Citizenship Middle School
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
Phishing, what you should know
When you get caught for Identity Theft
Cybersecurity Awareness
Protecting Your Identity:
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Protecting Senior Citizens from Phishing s
Protecting Your Credit Identity
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

To:Employee From: impersonated official company Message: Give us personal information here

You may be wondering what exactly a phishing scam is?

Phishing scams are not to be taken lightly as the can be very dangerous so first lets take a look at the definition to better understand phishing scams

You may be wondering what exactly a phishing scam is? Phishing scams are not to be taken lightly as the can be very dangerous so first lets take a look at the definition to better understand phishing scams Phishing is a term used to describe the act of receiving an , text message, or some other form of messaging where the message attempt to obtain person information of the receiver. The message does this by appearing professional and urgent. It also including a link where the receiver fills out personal information such as: Credit card number Address Social insurance number Online bank account number and password etc

An example of a phishing that you might receive or have already received would be:

To: From: Subject: Important Account Change Dear loyal customer We have recently changed our security protocols for online banking and it is imperative that you sign in and update your account settings. Please do this immediately to avoid any further damage. Sign In (link to website)

An example of a phishing that you might receive or have already received would be: To: From: Subject: Important Account Change Dear loyal customer We have recently changed our security protocols for online banking and it is imperative that you sign in and update your account settings. Please do this immediately to avoid any further damage. Sign In (link to website) This may seem legitimist, however it is not The website that is linked will often look exactly like the official one.

By looking for specific characteristics and key phrases

Characteristics  The content of a phishing or text message is intended to trigger a quick reaction from you and will demand an urgent response. Phishing messages are almost never personalized.  Phishing messages will often ask you for an update, confirmation, or validating you account or something bad will happen  Often messages and linked websites will include official looking logos, trademarks, and other identifying information

By looking for specific characteristics and key phrases Characteristics  The content of a phishing or text message is intended to trigger a quick reaction from you and will demand an urgent response. Phishing messages are almost never personalized.  Phishing messages will often ask you for an update, confirmation, or validating you account or something bad will happen  Often messages and linked websites will include official looking logos, trademarks, and other identifying information Key Phrases  Money Transfer Alert: Please verify this payment information below…  It has come to our attention that your online banking profile needs to be updated as part of our continuous efforts to protect your account and reduce instances of fraud…  Dear Online Account Holder, Access To Your Account Is Currently Unavailable…  Important Service Announcement from…, You have 1 unread Security Message!  We regret to inform you that we had to lock your bank account access. Call (telephone number) to restore your bank account.

What can happen when you fall victim to phishing?

Identity theft Yes.. Ahem!... I’m Terrance Crone...the real one

What can happen when you fall victim to phishing? Identity theft Yes.. Ahem!... I’m Terrance Crone...the real one And what are the affects of identity theft you ask?

What can happen when you fall victim to phishing? Identity theft Yes.. Ahem!... I’m Terrance Crone...the real one And what are the affects of identity theft you ask? Unknown credit card bills Available funds: $0

What can happen when you fall victim to phishing? Identity theft Yes.. Ahem!... I’m Terrance Crone...the real one And what are the affects of identity theft you ask? Unknown credit card bills Available funds: $0 Unauthorized loans taken out in your name “Why is my bank account frozen!” Operator says, “we are holding your account pending payment on a three month late loan Payment. “Uh... What!?

What can happen when you fall victim to phishing? Identity theft Yes.. Ahem!... I’m Terrance Crone...the real one And what are the affects of identity theft you ask? Unknown credit card bills Available funds: $0 An illegal immigrant can even work using your social security number if it’s given during a successful phishing scam Unauthorized loans taken out in your name “Why is my bank account frozen!” Operator says, “we are holding your account pending payment on a three month late loan Payment. “Uh... What!?

Remember to always look for the characteristics and key phrases that a phishing scam would have. Also remember that if you believe the to be legitimate contact the business who supposedly sent you the by going to their website through a Google search or a bookmark, not the provided link, and phoning them. Another note to keep in mind is to get into the habit of regularly checking your bank, credit card, and debit card statement to ensure all transactions are legitimate.

We at Banana Bill whish to ensure your and our safety when receiving s at your work and personal addresses against phishing scams.

Remember to always look for the characteristics and key phrases that a phishing scam would have. Also remember that if you believe the to be legitimate contact the business who supposedly sent you the by going to their website through a Google search or a bookmark, not the provided link, and phoning them. Another note to keep in mind is to get into the habit of regularly checking your bank, credit card, and debit card statement to ensure all transactions are legitimate. Thanks for watching & enjoy the rest of your day!! A message from your CEO, Terrance Crone Terrance Crone We at Banana Bill whish to ensure your and our safety when receiving s at your work and personal addresses against phishing scams.

Work Cited Slide 10,11,17,21: “ Fraud / Phishing.” Rcmp.gc.org. Royal Canadian Mounted Police. January Slide 10,11,17,21: “Phishing.” ongaurdonline.gov. OnGuardOnline.gov. January of phishing messages Slide 10,11,17,21: “Phishing.” wikipedia.org. Wikipedia The Free Encyclopedia. January Slide: 1“Free Music Track 1.” soundjay.com. SOUND JAY. January (Only music is required to be cited on this website not the other sounds used) Slide: 5,8, 18: “background and Photoshop patterns.” Backgroundlabs.com. Background Labs free background & patterns. January Slide 6,7: “A Thoroughly Reputable Bank.” rbccriminalintent.com. A True David and Goliath Story. January (All other images are used through Microsoft clip art and are allowed to be used in presentations/school projects)