SlideShare une entreprise Scribd logo
1  sur  29
Welcome!
Our meeting will begin shortly…
How to Protect Your Business From
Internet Phishing Scams
Presented by: Tim Geigner
Malware: Malicious email that appears be
legit
Mass amounts of unpersonalizaed
emails are sentdamage to your
computer system
Phishing is the act of illegally trying to acquire private
information such as passwords, credit card account numbers,
banking account information, and social security numbers by
posing as a legitimate electronic communication.
What is Phishing?
Spear Phishing
Conventional Phishing
A targeted victim is sent a
personalized email. o be legit
How are victims exposed to phishing
scams?
 Email
How are victims exposed to phishing
scams?
 Email
 Pop-ups
How are victims exposed to phishing
scams?
 Email
 Pop-ups
 Instant Messages
How are victims exposed to phishing
scams?
 Email
 Pop-ups
 Instant Messages
 Social Media: Twitter, Facebook
How to
Spot a Phishing Scam
How to Spot A Phishing Scam
 Incorrect Spelling & Bad Grammar
 Not typically personalized, yet they can be
 An attachment that appears legit
 Sense of urgency/threats
 URL Links in email
http://www.chasebank.com/loginscritp/user1.jsp
 Requests personal information: usernames, password, social
security numbers, date of birth, credit card numbers, etc.
Be Suspicious!
Dear Valued Customer,
It has come to our attention that your account information needs to be
updated due to inactive members, frauds and spoof reports.
It is critical that you take 5-10 minutes to renew your records, in order
for you to avoid any future issues with your online service. It is very
important to have this complete no later than: March 30, 2012. Faling
to take action will result in the closure of your account.
Please follow the link below and renew your account information.
https://www.chasebank.com/ukoup-date.htm
Sincerely,
Chase Bank Customer Department
Not personalized
Incorrect
spelling
Misguiding URL link
Why People Fall for Phishing Scams
Creates a reaction!
Not aware of the signs
Phishing scams are meant to appear legitimate
Typically include upsetting or exciting
(false) statements, special offers or
prizes:
Who Is Responsible?
Cyber Criminals
Want: Personal and financial information
What to do if you have been
hacked
1. Report the issue to your bank or credit card company
What to do if you have been hacked?
1. Report the issue to your bank or credit card company
2. Place a fraud alert through a credit reporting agency
What to do if you have been hacked?
1. Report the issue to your bank or credit card company
2. Place a fraud alert through a credit reporting agency
3. Remove Internet Browser
What to do if you have been hacked?
1. Report the issue to your bank or credit card company
2. Place a fraud alert through a credit reporting agency
3. Remove Internet Browser
What to do if you have been hacked?
4. Install and or up date anti-virus and personal
firewall software
1. Report the issue to your bank or credit card company
2. Place a fraud alert through a credit reporting agency
3. Remove Internet Browser
What to do if you have been hacked?
4. Install and or up date anti-virus and personal
firewall software
5.Change your passwords
How to Protect Your Business
Against Phishing Scams
How to Protect Your Business Against
Phishing Scams
 Install anti-virus and anti-spyware applications – keep updated
How to Protect Your Business Against
Phishing Scams
 Install anti-virus and anti-spyware applications – keep updated
 Install a firewall
How to Protect Your Business Against
Phishing Scams
 Install anti-virus and anti-spyware applications – keep updated
 Install a firewall
 Do all online banking or credit card payments on a completely
locked down stand-alone computer
How to Protect Your Business Against
Phishing Scams
 Install anti-virus and anti-spyware applications – keep updated
 Install a firewall
 Do all online banking or credit card payments on a completely
locked down stand-alone computer
 Ensure Windows updates and security patches are updated and
installed – check for success on a regular basis
How to Protect Your Business Against
Phishing Scams
 Install anti-virus and anti-spyware applications – keep updated
 Install a firewall
 Do all online banking or credit card payments on a completely
locked down stand-alone computer
 Ensure Windows updates and security patches are updated and
installed – check for success on a regular basis
 Do not click on hyperlinks within an email
How to Protect Your Business Against
Phishing Scams
 Install anti-virus and anti-spyware applications – keep updated
 Install a firewall
 Do all online banking or credit card payments on a completely
locked down stand-alone computer
 Ensure Windows updates and security patches are updated and
installed – check for success on a regular basis
 Do not click on hyperlinks within an email
 Create strong unique passwords
How to Protect Your Business Against
Phishing Scams
 Install anti-virus and anti-spyware applications – keep updated
 Install a firewall
 Do all online banking or credit card payments on a completely
locked down stand-alone computer
 Ensure Windows updates and security patches are updated and
installed – check for success on a regular basis
 Do not click on hyperlinks within an email
 Create strong unique passwords
 Educate your employees on the signs
How to Protect Your Business Against
Phishing Scams
 Install anti-virus and anti-spyware applications – keep updated
 Install a firewall
 Do all online banking or credit card payments on a completely
locked down stand-alone computer
 Ensure Windows updates and security patches are updated and
installed – check for success on a regular basis
 Do not click on hyperlinks within an email
 Create strong unique passwords
 Educate your employees on the signs
 Discuss options with your IT professional
Free Network Security Audit
the first 7 people to respond or
Special Offer
Expires: April 30, 2012
(312) 957-7459
Or
www.digeratigroup.com/
Questions?

Contenu connexe

Tendances

Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
tamfin
 

Tendances (20)

Anti phishing
Anti phishingAnti phishing
Anti phishing
 
Computer 4 ict
Computer 4 ictComputer 4 ict
Computer 4 ict
 
Phis
PhisPhis
Phis
 
Security At Home
Security At HomeSecurity At Home
Security At Home
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
 
Irm 13-phishing
Irm 13-phishingIrm 13-phishing
Irm 13-phishing
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
Phishing
PhishingPhishing
Phishing
 
eSmart Libraries cybersafety presentation june 2015
eSmart Libraries cybersafety presentation june 2015eSmart Libraries cybersafety presentation june 2015
eSmart Libraries cybersafety presentation june 2015
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Phishing
PhishingPhishing
Phishing
 
Intro phishing
Intro phishingIntro phishing
Intro phishing
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 

Similaire à Internet Phishing

W A2 Group P P
W A2  Group  P PW A2  Group  P P
W A2 Group P P
tawnygsu
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101
HaroldCo
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
need help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfneed help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdf
anjandavid
 

Similaire à Internet Phishing (20)

Phishing Technology
Phishing TechnologyPhishing Technology
Phishing Technology
 
Phishing
PhishingPhishing
Phishing
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
 
Phishing
PhishingPhishing
Phishing
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
How to avoid fake invoicing that stops growth for businesses
How to avoid fake invoicing that stops growth for businessesHow to avoid fake invoicing that stops growth for businesses
How to avoid fake invoicing that stops growth for businesses
 
Is this a scam.pdf
Is this a scam.pdfIs this a scam.pdf
Is this a scam.pdf
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
W A2 Group P P
W A2  Group  P PW A2  Group  P P
W A2 Group P P
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101
 
Data Security for Nonprofits
Data Security for NonprofitsData Security for Nonprofits
Data Security for Nonprofits
 
Protecting Your Business, Cybersecurity, and working remotely during COVID-19
Protecting Your Business, Cybersecurity, and working remotely during COVID-19Protecting Your Business, Cybersecurity, and working remotely during COVID-19
Protecting Your Business, Cybersecurity, and working remotely during COVID-19
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
How To Protect Yourself and Your Computer Online
How To Protect Yourself and Your Computer OnlineHow To Protect Yourself and Your Computer Online
How To Protect Yourself and Your Computer Online
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
need help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfneed help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdf
 

Dernier

Udaipur Call Girls ☎ 9602870969✅ Best Genuine Call Girl in Udaipur Escort Ser...
Udaipur Call Girls ☎ 9602870969✅ Best Genuine Call Girl in Udaipur Escort Ser...Udaipur Call Girls ☎ 9602870969✅ Best Genuine Call Girl in Udaipur Escort Ser...
Udaipur Call Girls ☎ 9602870969✅ Best Genuine Call Girl in Udaipur Escort Ser...
Apsara Of India
 
Goa Escorts Service 9540619990 Call Girls in Goa
Goa Escorts Service 9540619990 Call Girls in GoaGoa Escorts Service 9540619990 Call Girls in Goa
Goa Escorts Service 9540619990 Call Girls in Goa
Goa escorts Service 😋 Goa escort agency
 
Call Girls in New delhi railway station 8447389422 Escorts service ❤️
Call Girls in New delhi railway station 8447389422 Escorts service ❤️Call Girls in New delhi railway station 8447389422 Escorts service ❤️
Call Girls in New delhi railway station 8447389422 Escorts service ❤️
ankitagirls22
 
Call Girls In Karachi-->>03274048030<<--Meet Call Girls In Karachi for Unforg...
Call Girls In Karachi-->>03274048030<<--Meet Call Girls In Karachi for Unforg...Call Girls In Karachi-->>03274048030<<--Meet Call Girls In Karachi for Unforg...
Call Girls In Karachi-->>03274048030<<--Meet Call Girls In Karachi for Unforg...
Sana Rajpoot
 
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
Apsara Of India
 
Call Girls In Karachi-->>03224951619<<--100+ Hot Girls WhatsApp Numbers Book ...
Call Girls In Karachi-->>03224951619<<--100+ Hot Girls WhatsApp Numbers Book ...Call Girls In Karachi-->>03224951619<<--100+ Hot Girls WhatsApp Numbers Book ...
Call Girls In Karachi-->>03224951619<<--100+ Hot Girls WhatsApp Numbers Book ...
Laiba Pari
 
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Ifra Zohaib
 

Dernier (20)

ROORKEE CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICE
ROORKEE CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICEROORKEE CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICE
ROORKEE CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICE
 
AGARTALA CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
AGARTALA CALL GIRL 7857803690 LOW PRICE ESCORT SERVICEAGARTALA CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
AGARTALA CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
Udaipur Call Girls ☎ 9602870969✅ Best Genuine Call Girl in Udaipur Escort Ser...
Udaipur Call Girls ☎ 9602870969✅ Best Genuine Call Girl in Udaipur Escort Ser...Udaipur Call Girls ☎ 9602870969✅ Best Genuine Call Girl in Udaipur Escort Ser...
Udaipur Call Girls ☎ 9602870969✅ Best Genuine Call Girl in Udaipur Escort Ser...
 
Unnao 💋 Call Girl 97487*63073 Call Girls in unnao Escort service book now
Unnao 💋  Call Girl 97487*63073 Call Girls in unnao Escort service book nowUnnao 💋  Call Girl 97487*63073 Call Girls in unnao Escort service book now
Unnao 💋 Call Girl 97487*63073 Call Girls in unnao Escort service book now
 
Mainpuri Escorts 📞 8617370543 | Mainpuri Call Girls
Mainpuri Escorts 📞 8617370543 | Mainpuri Call GirlsMainpuri Escorts 📞 8617370543 | Mainpuri Call Girls
Mainpuri Escorts 📞 8617370543 | Mainpuri Call Girls
 
Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...
Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...
Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...
 
Goa Escorts Service 9540619990 Call Girls in Goa
Goa Escorts Service 9540619990 Call Girls in GoaGoa Escorts Service 9540619990 Call Girls in Goa
Goa Escorts Service 9540619990 Call Girls in Goa
 
Call Girls in New delhi railway station 8447389422 Escorts service ❤️
Call Girls in New delhi railway station 8447389422 Escorts service ❤️Call Girls in New delhi railway station 8447389422 Escorts service ❤️
Call Girls in New delhi railway station 8447389422 Escorts service ❤️
 
Call Girls In Karachi-->>03274048030<<--Meet Call Girls In Karachi for Unforg...
Call Girls In Karachi-->>03274048030<<--Meet Call Girls In Karachi for Unforg...Call Girls In Karachi-->>03274048030<<--Meet Call Girls In Karachi for Unforg...
Call Girls In Karachi-->>03274048030<<--Meet Call Girls In Karachi for Unforg...
 
Hubli❤CALL GIRL 9647466585 ❤CALL GIRLS IN Hubli ESCORT SERVICE
Hubli❤CALL GIRL 9647466585 ❤CALL GIRLS IN Hubli ESCORT SERVICEHubli❤CALL GIRL 9647466585 ❤CALL GIRLS IN Hubli ESCORT SERVICE
Hubli❤CALL GIRL 9647466585 ❤CALL GIRLS IN Hubli ESCORT SERVICE
 
9999266834 Call Girls In Noida Sector 51 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 51 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 51 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 51 (Delhi) Call Girl Service
 
Prince Armahs(Tinky) Brochure, for Funeral service
Prince Armahs(Tinky) Brochure, for Funeral servicePrince Armahs(Tinky) Brochure, for Funeral service
Prince Armahs(Tinky) Brochure, for Funeral service
 
Agra 💋Call Girl 9748763073 Call Girls in Agra Escort service book now
Agra 💋Call Girl 9748763073 Call Girls in Agra Escort service book nowAgra 💋Call Girl 9748763073 Call Girls in Agra Escort service book now
Agra 💋Call Girl 9748763073 Call Girls in Agra Escort service book now
 
Satara call girl 8797040791♥️ call girls in satara escort service
Satara call girl 8797040791♥️ call girls in satara escort serviceSatara call girl 8797040791♥️ call girls in satara escort service
Satara call girl 8797040791♥️ call girls in satara escort service
 
Budaun Call Girl WhatsApp Chat: 📞 8617370543 | Girls Number for Friendship
Budaun Call Girl WhatsApp Chat: 📞 8617370543 | Girls Number for FriendshipBudaun Call Girl WhatsApp Chat: 📞 8617370543 | Girls Number for Friendship
Budaun Call Girl WhatsApp Chat: 📞 8617370543 | Girls Number for Friendship
 
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
 
Mysore❤CALL GIRL 9647466585 ❤CALL GIRLS IN Mysore ESCORT SERVICE
Mysore❤CALL GIRL 9647466585 ❤CALL GIRLS IN Mysore ESCORT SERVICEMysore❤CALL GIRL 9647466585 ❤CALL GIRLS IN Mysore ESCORT SERVICE
Mysore❤CALL GIRL 9647466585 ❤CALL GIRLS IN Mysore ESCORT SERVICE
 
Call Girls In Karachi-->>03224951619<<--100+ Hot Girls WhatsApp Numbers Book ...
Call Girls In Karachi-->>03224951619<<--100+ Hot Girls WhatsApp Numbers Book ...Call Girls In Karachi-->>03224951619<<--100+ Hot Girls WhatsApp Numbers Book ...
Call Girls In Karachi-->>03224951619<<--100+ Hot Girls WhatsApp Numbers Book ...
 
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
 
Call Girls Pune Call WhatsApp 7870993772 Top Class Call Girl Service Availab...
Call Girls Pune Call  WhatsApp 7870993772 Top Class Call Girl Service Availab...Call Girls Pune Call  WhatsApp 7870993772 Top Class Call Girl Service Availab...
Call Girls Pune Call WhatsApp 7870993772 Top Class Call Girl Service Availab...
 

Internet Phishing

  • 1. Welcome! Our meeting will begin shortly…
  • 2. How to Protect Your Business From Internet Phishing Scams Presented by: Tim Geigner
  • 3. Malware: Malicious email that appears be legit Mass amounts of unpersonalizaed emails are sentdamage to your computer system Phishing is the act of illegally trying to acquire private information such as passwords, credit card account numbers, banking account information, and social security numbers by posing as a legitimate electronic communication. What is Phishing? Spear Phishing Conventional Phishing A targeted victim is sent a personalized email. o be legit
  • 4. How are victims exposed to phishing scams?  Email
  • 5. How are victims exposed to phishing scams?  Email  Pop-ups
  • 6. How are victims exposed to phishing scams?  Email  Pop-ups  Instant Messages
  • 7. How are victims exposed to phishing scams?  Email  Pop-ups  Instant Messages  Social Media: Twitter, Facebook
  • 8. How to Spot a Phishing Scam
  • 9. How to Spot A Phishing Scam  Incorrect Spelling & Bad Grammar  Not typically personalized, yet they can be  An attachment that appears legit  Sense of urgency/threats  URL Links in email http://www.chasebank.com/loginscritp/user1.jsp  Requests personal information: usernames, password, social security numbers, date of birth, credit card numbers, etc. Be Suspicious!
  • 10. Dear Valued Customer, It has come to our attention that your account information needs to be updated due to inactive members, frauds and spoof reports. It is critical that you take 5-10 minutes to renew your records, in order for you to avoid any future issues with your online service. It is very important to have this complete no later than: March 30, 2012. Faling to take action will result in the closure of your account. Please follow the link below and renew your account information. https://www.chasebank.com/ukoup-date.htm Sincerely, Chase Bank Customer Department Not personalized Incorrect spelling Misguiding URL link
  • 11. Why People Fall for Phishing Scams Creates a reaction! Not aware of the signs Phishing scams are meant to appear legitimate Typically include upsetting or exciting (false) statements, special offers or prizes:
  • 12. Who Is Responsible? Cyber Criminals Want: Personal and financial information
  • 13. What to do if you have been hacked
  • 14. 1. Report the issue to your bank or credit card company What to do if you have been hacked?
  • 15. 1. Report the issue to your bank or credit card company 2. Place a fraud alert through a credit reporting agency What to do if you have been hacked?
  • 16. 1. Report the issue to your bank or credit card company 2. Place a fraud alert through a credit reporting agency 3. Remove Internet Browser What to do if you have been hacked?
  • 17. 1. Report the issue to your bank or credit card company 2. Place a fraud alert through a credit reporting agency 3. Remove Internet Browser What to do if you have been hacked? 4. Install and or up date anti-virus and personal firewall software
  • 18. 1. Report the issue to your bank or credit card company 2. Place a fraud alert through a credit reporting agency 3. Remove Internet Browser What to do if you have been hacked? 4. Install and or up date anti-virus and personal firewall software 5.Change your passwords
  • 19. How to Protect Your Business Against Phishing Scams
  • 20. How to Protect Your Business Against Phishing Scams  Install anti-virus and anti-spyware applications – keep updated
  • 21. How to Protect Your Business Against Phishing Scams  Install anti-virus and anti-spyware applications – keep updated  Install a firewall
  • 22. How to Protect Your Business Against Phishing Scams  Install anti-virus and anti-spyware applications – keep updated  Install a firewall  Do all online banking or credit card payments on a completely locked down stand-alone computer
  • 23. How to Protect Your Business Against Phishing Scams  Install anti-virus and anti-spyware applications – keep updated  Install a firewall  Do all online banking or credit card payments on a completely locked down stand-alone computer  Ensure Windows updates and security patches are updated and installed – check for success on a regular basis
  • 24. How to Protect Your Business Against Phishing Scams  Install anti-virus and anti-spyware applications – keep updated  Install a firewall  Do all online banking or credit card payments on a completely locked down stand-alone computer  Ensure Windows updates and security patches are updated and installed – check for success on a regular basis  Do not click on hyperlinks within an email
  • 25. How to Protect Your Business Against Phishing Scams  Install anti-virus and anti-spyware applications – keep updated  Install a firewall  Do all online banking or credit card payments on a completely locked down stand-alone computer  Ensure Windows updates and security patches are updated and installed – check for success on a regular basis  Do not click on hyperlinks within an email  Create strong unique passwords
  • 26. How to Protect Your Business Against Phishing Scams  Install anti-virus and anti-spyware applications – keep updated  Install a firewall  Do all online banking or credit card payments on a completely locked down stand-alone computer  Ensure Windows updates and security patches are updated and installed – check for success on a regular basis  Do not click on hyperlinks within an email  Create strong unique passwords  Educate your employees on the signs
  • 27. How to Protect Your Business Against Phishing Scams  Install anti-virus and anti-spyware applications – keep updated  Install a firewall  Do all online banking or credit card payments on a completely locked down stand-alone computer  Ensure Windows updates and security patches are updated and installed – check for success on a regular basis  Do not click on hyperlinks within an email  Create strong unique passwords  Educate your employees on the signs  Discuss options with your IT professional
  • 28. Free Network Security Audit the first 7 people to respond or Special Offer Expires: April 30, 2012 (312) 957-7459 Or www.digeratigroup.com/

Notes de l'éditeur

  1. Welcome and thank you for joining us for today’s webinar on protecting your business from internet phishing scams. While perhaps not a mainstream term yet, not only have the number of phishing attacks risen dramatically over the past five years, but so too has the sophistication and deceptiveness of these attacks. Today we’ll be discussing techniques for combatting this threat.
  2. So what is phishing? Phishing emails usually appear to come from a well-known organization and ask for your personal information — such as credit card number, social security number, account number or password. Often times phishing attempts appear to come from legitimate sites, services and companies with which you do not even have an account. Phishing scenarios are typically carried out through e-mail and often contain links to a fake website with a look and feel almost identical to a legitimate site. Once on the site users are cajoled into entering usernames and passwords or other sensitive information that will provide hackers with broad access to data.
  3. Phishing is typically done via email.
  4. Pop up sites are another method phishers use.
  5. Instant messages are less common, but phishing is done through IM as well.
  6. And social medida is kind of a no-brainer. If criminals can gather information about you from social media posts and profiles, they can use that information to try to trick you into trusting them. Security experts call this "spear phishing”, as it’s a more targeted approach. A report provided by McAfee suggests: "Social media connections will eventually replace e-mail as the primary vector for distributing malicious code and links," “Last year ended with some of the lowest global e-mail spam levels in years, as more and more users transition from 'slower' legacy communications such as e-mail in favor of more immediate methods such as instant messaging and Twitter," the report says. And, as we all know, where the users go, so to will the scammers.
  7. Let’s discuss some methods for identifying a phishing scam.
  8. Sometimes scammers operate in a second language and they give themselves away by using poor grammar or spelling. The most effective way to counter these types of attacks is to train the recipients on how to identify and avoid a phishing attempt on their own. Phishing attacks are normally directed towards millions of people through email spam. The emails sent out during a phish are therefore impersonal and general, contrary to emails from your bank which are usually personal in nature. The big banks with a higher probability for hitting customers are impersonated most often. Nearly all large banks in the world have been subject to phishing frauds trying to reach their customers. Examples are the Bank of America, Bank of Montreal and the ANZ Bank of Australia. Valid messages from your bank or e-commerce company generally are personalized, but always call to check if you are unsure Attachments that appear legit is how a phisher places malware on your computer. That malware can result in a variety of attacks, including rogue antivirus and other programs that ask for financial information. Going along with these communications is usually some threat or urgent deadline, including fake reports of malware, bank account policy changes, etc. These emails also tend to include URL links, almost always to imposter sites run by the criminals. And, of course, they’re after personal information, login information, and financial information.
  9. In order for criminals to successfully "phish" your personal information, they often must get you to go from an email to a website. Phishing emails will almost always tell you to click a link that takes you to a site where your personal information is requested. Legitimate organizations would never request this information of you via email. As an example, an Official-looking email from your favorite bank requests you to change your online banking password or update personal data by following a spoofed website link. No financial institution with any sense will email you and ask you to input your sensitive information. In fact, most institutions are informing customers that “We will never ask you for your personal information via phone or email”.
  10. Phishing scams are meant to and usually do a pretty good job at making the email or pop up it is in appear legitimate. they might include a graphic from the bank right on the email message or website. Or, the link provided in the email may look like it goes to the bank’s website while the victim is actually sent to a very different site Users should double check with their financial institutions before opening attachments or clicking on any links.
  11. Organized Internet Criminal Groups, most often located overseas, are the typical phishing culprits As for the software itself, Hacking groups offer software packages (sometimes for free) that make it easy to quickly set up a fraudulent web site mimicking a known brand in order to trick people in proving personal info. This software is then used by others to spread phishing attacks.
  12. Regardless of our precautions, sometimes phishing attacks are successful, so let’s discuss what we do in the event of a hack.
  13. If the scam involved a bank or credit card account information being transferred report the issue to the appropriate place. CC companies usually have a 24-hour service to deal with emergencies like this. Depending on the financial institution’s recommendations it might be necessary to cancel that account and open up a new one. Banks invest more in the consumer because if they lose money, the bank recovers the loss. The bank doesn’t normally doesn’t have to refund business accounts, however. In addition, there are usually different rules for customers and businesses when it comes to disputing charges, Consumer: 60 days from receipt of monthly statement to dispute Business: Typically have no more than 2 business days to spot and dispute being hacked into you should file a report with law enforcement. You should provide them with a written document of what was lost, dates, times, etc. You should also take a look at your billing statements to check for any unauthorized charges. If you have received an email from a hacker posing as a financial institution, but did not fall victim to the attempt you can still report the issue. If you click on a link and are directed to a site that downloads malware (virus) into your computer, you
  14. Identity theft occurs when someone uses your personal information such as your name, Social Security number, credit card number or other identifying information, without your permission to commit fraud or other crimes. If you have given out this kind of information to a phisher, you should do the following: Report the theft to the three major credit reporting agencies, Experian, Equifax and TransUnion Corporation, and do the following: Request that they place a fraud alert and a victim’s statement in your file. Request a FREE copy of your credit report to check whether any accounts were opened without your consent. Request that the agencies remove inquiries and/or fraudulent accounts stemming from the theft.
  15. Some phishing attacks use viruses and/or Trojans to install programs called "key loggers" on your computer. These programs capture and send out any information that you type to the phisher, including credit card numbers, usernames and passwords, Social Security Numbers, etc. In this case, you should wipe your browser completely and reinstall a fresh copy.
  16. In addition, often times phishing attacks will deliver additional malware to the user’s machine. To protect against this, you should: Install and/or update anti-virus and personal firewall software Update all virus definitions and run a full scan Confirm every connection your firewall allows
  17. If your system appears to have been compromised, fix it and then change your password again, since you may well have transmitted the new one to the hacker.
  18. Getting away from the user for a moment, let’s discuss how to globally protect your business against phishing scams.
  19. Although anti-virus and spyware software can’t offer 100% protection, One of the most important things you can do to avoid phishing attacks is keep your antivirus software up-to-date because most antivirus vendors have signatures that protect against some common exploits. This can prevent things such as a Trojans disguising your Web address bar or mimicking an https secure link. If your antivirus software is not up-to-date, you are usually more susceptible to attacks that can hijack your Web browser and put you at risk for phishing attacks. Make sure every computer used has up-to-date virus and malware protection.  Schedule regular full system scans.  Never download "anti-virus" software from an unknown entity. It's better to stick with trusted brands.
  20. A perimeter firewall is key as well, for all the same reasons as endpoint antivirus software. Make sure your firewall is under maintenance and has all the latest definitions and updates.
  21. Any financial transactions should only be done on a trusted, secure computer.
  22. Make sure your network is current on its Windows updates and patches. Don’t wait for Patch Tuesday to secure your equipment, since the criminals won’t wait. Keep your machines current on an ONGOING basis.
  23. It is never a good idea to click on any hyperlink in an e-mail, especially from unknown sources. You never know where the link is going to really take you or whether it will trigger malicious code. Some hyperlinks can take you to a fake HTML page that may try to scam you into typing sensitive information. If you really want to check out the link, manually retype it into a Web browser.
  24. Create strong unique passwords and change themfrequently At least 10 characters long, use a combination of upper and lower case, letters, numbers, and symbols. Avoid using any of the following: your name, your spouse, children’s, or your pet’s name; your birthdate, address, any part of your social security number, a series of consecutive numbers, any single word that appears in a dictionary, or double or repeat words
  25. Make sure your employees are aware of what phishing scams are, and are cautious when reading and responding to suspicious emails. Instead of clicking a link, open another browser window and go to the official website. We covered various signs of a phishing scam email: Incorrect Spelling, Sense of Urgency , Asking for personal financial information i.e. usernames, passwords, social security numbers, date of birth, credit card numbers, etc, Email from a bank or credit card company you are not a customer with, email from a bank that requests personal information. Make sure your users know the warning signs.
  26. IT professionals can make more complete and appropriate recommendations tailored specifically around your equipment, software, and users.
  27. And that wraps it up. Thank you for joining us for today’s webinar. Before we sign off, we did want to leave you with a free offer from Digerati Group. The first 7 folks that respond to us with a call or email will receive a free network security audit, during which we’ll: Test your firewall, anti-virus and spyware protection Check your backups Review your acceptable use policy Check your online security settings Discuss the training needs of your staff with regards to security
  28. And with that, I’d like to open up the call to any questions or comments.