SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
PHISHING & CYBER
ATTACK AWARENESSDon’t Take the Bait. Learn how to Spot a Scam.
Phishing( Homophone: fishing )
uses fraudulent email messages designed to impersonate a
legitimate person or organization and trick the recipient into
downloading harmful attachments or divulging sensitive
information.
Identity Theft
is the crime of obtaining the personal or financial
information of another person for the sole purpose
of assuming that person’s name or identity to make
transactions or purchases.
The targets are usually high-level executives (CEOs, CFOs,
COOs) or officers who regularly perform money transfers.
Objective is to:
- Retrieve confidential company or personal information.
- Plant malware / ransom-ware.
- Impersonate the email accounts of C-suite Executives.
Stolen Information
may include:
—Security information
—Employee Database
—Data to compromise operations of the organization
Denial of Service (DoS)
attempts to overwhelm a server with web traffic and take
the website offline.
A DoS May be a Smokescreen
Frequently used as a decoy to distract IT staff from an
intrusion taking place at the same time.
“It’s not a question if your network will be
breached, the only question is when.”
Be Aware. Be Prepared. Take Action.
PHISHING & CYBER
ATTACK AWARENESSDon’t Take the Bait. Learn how to Spot a Scam.
Phishing( Homophone: fishing )
uses fraudulent email messages designed to impersonate a
legitimate person or organization and trick the recipient into
downloading harmful attachments or divulging sensitive
information.
“It’s not a question if your network will be
breached, the only question is when.”
Be Aware. Be Prepared. Take Action.
Whattodo?
Treat any email attachments
with a healthy suspicion.
In case of doubt,
seek assistance
from the IT Officer.
In case of a compromise,immediately change yourpassword.
Inform stakeholders about thescam to prevent any theft, breachor unauthorized transaction.
Always encrypt email
attachments containing
sensitive information.
Change email
password every
3 months.
Always check the Sender’s email
address before taking on any
sensitive transaction.
Some phishing may also appear as Password Expiration Alert
Embedded links in an email may redirect you to an unsecure
website that requests sensitive information
Report phishing
email to the IT
Officer.
PHISHING & CYBER
ATTACK AWARENESSDon’t Take the Bait. Learn how to Spot a Scam.
Phishing( Homophone: fishing )
uses fraudulent email messages designed to impersonate a
legitimate person or organization and trick the recipient into
downloading harmful attachments or divulging sensitive
information.
“It’s not a question if your network will be
breached, the only question is when.”
Be Aware. Be Prepared. Take Action.
Whattodo?
Treat any email attachments
with a healthy suspicion.
In case of doubt,
seek assistance
from the IT Officer.
In case of a compromise,immediately change yourpassword.
Inform stakeholders about thescam to prevent any theft, breachor unauthorized transaction.
Always encrypt email
attachments containing
sensitive information.
Change email
password every
3 months.
Always check the Sender’s email
address before taking on any
sensitive transaction.
Attachments may contain malware which can lead to data
breach when opened.
A Trojan via a malicious email attachment or ad may be
installed which will allow attacker to exploit loopholes and
obtain sensitive information.
Report phishing
email to the IT
Officer.
PHISHING & CYBER
ATTACK AWARENESSDon’t Take the Bait. Learn how to Spot a Scam.
Phishing( Homophone: fishing )
uses fraudulent email messages designed to impersonate a
legitimate person or organization and trick the recipient into
downloading harmful attachments or divulging sensitive
information.
“It’s not a question if your network will be
breached, the only question is when.”
Be Aware. Be Prepared. Take Action.
Whattodo?
Treat any email attachments
with a healthy suspicion.
In case of doubt,
seek assistance
from the IT Officer.
In case of a compromise,immediately change yourpassword.
Inform stakeholders about thescam to prevent any theft, breachor unauthorized transaction.
Always encrypt email
attachments containing
sensitive information.
Change email
password every
3 months.
Always check the Sender’s email
address before taking on any
sensitive transaction.
Clicking links can authorize certain instructions
leading to data breach or identity theft.
Report phishing
email to the IT
Officer.
PHISHING & CYBER
ATTACK AWARENESSDon’t Take the Bait. Learn how to Spot a Scam.
Phishing( Homophone: fishing )
uses fraudulent email messages designed to impersonate a
legitimate person or organization and trick the recipient into
downloading harmful attachments or divulging sensitive
information.
“It’s not a question if your network will be
breached, the only question is when.”
Be Aware. Be Prepared. Take Action.
Whattodo?
Treat any email attachments
with a healthy suspicion.
In case of doubt,
seek assistance
from the IT Officer.
In case of a compromise,immediately change yourpassword.
Inform stakeholders about thescam to prevent any theft, breachor unauthorized transaction.
Always encrypt email
attachments containing
sensitive information.
Change email
password every
3 months.
Always check the Sender’s email
address before taking on any
sensitive transaction.
Clicking links can authorize certain instructions
leading to data breach or identity theft.
Report phishing
email to the IT
Officer.
PHISHING & CYBER
ATTACK AWARENESSDon’t Take the Bait. Learn how to Spot a Scam.
Phishing( Homophone: fishing )
uses fraudulent email messages designed to impersonate a
legitimate person or organization and trick the recipient into
downloading harmful attachments or divulging sensitive
information.
“It’s not a question if your network will be
breached, the only question is when.”
Be Aware. Be Prepared. Take Action.
Whattodo?
Treat any email attachments
with a healthy suspicion.
In case of doubt,
seek assistance
from the IT Officer.
In case of a compromise,immediately change yourpassword.
Inform stakeholders about thescam to prevent any theft, breachor unauthorized transaction.
Always encrypt email
attachments containing
sensitive information.
Change email
password every
3 months.
Always check the Sender’s email
address before taking on any
sensitive transaction.
Report phishing
email to the IT
Officer.
Attackers spoof the email addresses of Senior Executives to
appear as a reputable source and provide instructions to
employees who normally or usually process fund
transfer instructions.

Contenu connexe

Tendances (20)

Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Juice Jacking
Juice Jacking Juice Jacking
Juice Jacking
 
Mobile security
Mobile securityMobile security
Mobile security
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Identity Theft
Identity Theft Identity Theft
Identity Theft
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cyber security
cyber security cyber security
cyber security
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham Ali
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Internet Securities Issues
Internet Securities IssuesInternet Securities Issues
Internet Securities Issues
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 

Similaire à Phishing & Cyber Attack Awareness

IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUBilly Warero
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Okan YILDIZ
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attackAariyaRathi
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitssuser64f8f8
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Preventionsonalikharade3
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking pptKrishma Sandesra
 
Security awareness
Security awarenessSecurity awareness
Security awarenessSanoop Nair
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxssuserb73103
 
Spamming and Hacking.pptx
Spamming and Hacking.pptxSpamming and Hacking.pptx
Spamming and Hacking.pptxSneha131950
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)aleeya91
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 

Similaire à Phishing & Cyber Attack Awareness (20)

IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Phishing
PhishingPhishing
Phishing
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
Phishing mails: Bonnes pratiques
Phishing mails: Bonnes pratiques Phishing mails: Bonnes pratiques
Phishing mails: Bonnes pratiques
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
internet security
internet securityinternet security
internet security
 
Spamming and Hacking.pptx
Spamming and Hacking.pptxSpamming and Hacking.pptx
Spamming and Hacking.pptx
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Pp8
Pp8Pp8
Pp8
 

Plus de Kittelson & Carpo Consulting

Starting a FinTech Company in the PH: The Ultimate Guide
Starting a FinTech Company in the PH: The Ultimate GuideStarting a FinTech Company in the PH: The Ultimate Guide
Starting a FinTech Company in the PH: The Ultimate GuideKittelson & Carpo Consulting
 
Doing Business in the Philippines: Business Registration Process Made Simple
Doing Business in the Philippines: Business Registration Process Made SimpleDoing Business in the Philippines: Business Registration Process Made Simple
Doing Business in the Philippines: Business Registration Process Made SimpleKittelson & Carpo Consulting
 
Competitive Wages in the Philippines: Earn More and Explore!
Competitive Wages in the Philippines: Earn More and Explore! Competitive Wages in the Philippines: Earn More and Explore!
Competitive Wages in the Philippines: Earn More and Explore! Kittelson & Carpo Consulting
 
The Tax Reform for Acceleration and Inclusion Law or TRAIN Law
The Tax Reform for Acceleration and Inclusion Law or TRAIN LawThe Tax Reform for Acceleration and Inclusion Law or TRAIN Law
The Tax Reform for Acceleration and Inclusion Law or TRAIN LawKittelson & Carpo Consulting
 
Train Bill - Tax Reform for Accelaration and Inclusion
Train Bill - Tax Reform for Accelaration and InclusionTrain Bill - Tax Reform for Accelaration and Inclusion
Train Bill - Tax Reform for Accelaration and InclusionKittelson & Carpo Consulting
 
2017 National, Official, and Non-working Holidays in the Philippines
2017 National, Official, and Non-working Holidays in the Philippines2017 National, Official, and Non-working Holidays in the Philippines
2017 National, Official, and Non-working Holidays in the PhilippinesKittelson & Carpo Consulting
 
Steps in reporting new employees to sss, philhealth, pag ibig, and bir
Steps in reporting new employees to sss, philhealth, pag ibig, and birSteps in reporting new employees to sss, philhealth, pag ibig, and bir
Steps in reporting new employees to sss, philhealth, pag ibig, and birKittelson & Carpo Consulting
 
7 Reasons why Accountants are important people in business
7 Reasons why Accountants are important people in business7 Reasons why Accountants are important people in business
7 Reasons why Accountants are important people in businessKittelson & Carpo Consulting
 
10 things to do before registering a business in the philippines
10 things to do before registering a business in the philippines10 things to do before registering a business in the philippines
10 things to do before registering a business in the philippinesKittelson & Carpo Consulting
 
Visa Matters: Solving the Puzzle Behind Philippine Visas & Immigration
Visa Matters: Solving the Puzzle Behind Philippine Visas & ImmigrationVisa Matters: Solving the Puzzle Behind Philippine Visas & Immigration
Visa Matters: Solving the Puzzle Behind Philippine Visas & ImmigrationKittelson & Carpo Consulting
 
Coffee mornings labor forum part 2: New DOLE Rules on Employee Termination
Coffee mornings  labor forum part 2: New DOLE Rules on Employee TerminationCoffee mornings  labor forum part 2: New DOLE Rules on Employee Termination
Coffee mornings labor forum part 2: New DOLE Rules on Employee TerminationKittelson & Carpo Consulting
 
Philippine Employment Law: Frequently Asked Questions
Philippine Employment Law: Frequently Asked QuestionsPhilippine Employment Law: Frequently Asked Questions
Philippine Employment Law: Frequently Asked QuestionsKittelson & Carpo Consulting
 

Plus de Kittelson & Carpo Consulting (20)

Things You Must Know About 13th-Month Pay
Things You Must Know About 13th-Month PayThings You Must Know About 13th-Month Pay
Things You Must Know About 13th-Month Pay
 
Starting a FinTech Company in the PH: The Ultimate Guide
Starting a FinTech Company in the PH: The Ultimate GuideStarting a FinTech Company in the PH: The Ultimate Guide
Starting a FinTech Company in the PH: The Ultimate Guide
 
Doing Business in the Philippines: Business Registration Process Made Simple
Doing Business in the Philippines: Business Registration Process Made SimpleDoing Business in the Philippines: Business Registration Process Made Simple
Doing Business in the Philippines: Business Registration Process Made Simple
 
Competitive Wages in the Philippines: Earn More and Explore!
Competitive Wages in the Philippines: Earn More and Explore! Competitive Wages in the Philippines: Earn More and Explore!
Competitive Wages in the Philippines: Earn More and Explore!
 
The Tax Reform for Acceleration and Inclusion Law or TRAIN Law
The Tax Reform for Acceleration and Inclusion Law or TRAIN LawThe Tax Reform for Acceleration and Inclusion Law or TRAIN Law
The Tax Reform for Acceleration and Inclusion Law or TRAIN Law
 
Data Privacy Act Update: Commit to Comply
Data Privacy Act Update: Commit to ComplyData Privacy Act Update: Commit to Comply
Data Privacy Act Update: Commit to Comply
 
Train Bill - Tax Reform for Accelaration and Inclusion
Train Bill - Tax Reform for Accelaration and InclusionTrain Bill - Tax Reform for Accelaration and Inclusion
Train Bill - Tax Reform for Accelaration and Inclusion
 
2017 National, Official, and Non-working Holidays in the Philippines
2017 National, Official, and Non-working Holidays in the Philippines2017 National, Official, and Non-working Holidays in the Philippines
2017 National, Official, and Non-working Holidays in the Philippines
 
Rules on-cpa-certificate-of-fs-preparation opt
Rules on-cpa-certificate-of-fs-preparation optRules on-cpa-certificate-of-fs-preparation opt
Rules on-cpa-certificate-of-fs-preparation opt
 
Provisional work visa in the Philippines
Provisional work visa in the PhilippinesProvisional work visa in the Philippines
Provisional work visa in the Philippines
 
How to beat the six second resume scan
How to beat the six second resume scanHow to beat the six second resume scan
How to beat the six second resume scan
 
Steps in reporting new employees to sss, philhealth, pag ibig, and bir
Steps in reporting new employees to sss, philhealth, pag ibig, and birSteps in reporting new employees to sss, philhealth, pag ibig, and bir
Steps in reporting new employees to sss, philhealth, pag ibig, and bir
 
7 Reasons why Accountants are important people in business
7 Reasons why Accountants are important people in business7 Reasons why Accountants are important people in business
7 Reasons why Accountants are important people in business
 
10 things to do before registering a business in the philippines
10 things to do before registering a business in the philippines10 things to do before registering a business in the philippines
10 things to do before registering a business in the philippines
 
Top 10 reasons why employees stay
Top 10 reasons why employees stayTop 10 reasons why employees stay
Top 10 reasons why employees stay
 
Visa Matters: Solving the Puzzle Behind Philippine Visas & Immigration
Visa Matters: Solving the Puzzle Behind Philippine Visas & ImmigrationVisa Matters: Solving the Puzzle Behind Philippine Visas & Immigration
Visa Matters: Solving the Puzzle Behind Philippine Visas & Immigration
 
Types of employment in the Philippines
Types of employment in the PhilippinesTypes of employment in the Philippines
Types of employment in the Philippines
 
Coffee mornings labor forum part 2: New DOLE Rules on Employee Termination
Coffee mornings  labor forum part 2: New DOLE Rules on Employee TerminationCoffee mornings  labor forum part 2: New DOLE Rules on Employee Termination
Coffee mornings labor forum part 2: New DOLE Rules on Employee Termination
 
Data privacy act of 2012 presentation
Data privacy act of 2012 presentationData privacy act of 2012 presentation
Data privacy act of 2012 presentation
 
Philippine Employment Law: Frequently Asked Questions
Philippine Employment Law: Frequently Asked QuestionsPhilippine Employment Law: Frequently Asked Questions
Philippine Employment Law: Frequently Asked Questions
 

Dernier

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Dernier (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Phishing & Cyber Attack Awareness

  • 1. PHISHING & CYBER ATTACK AWARENESSDon’t Take the Bait. Learn how to Spot a Scam. Phishing( Homophone: fishing ) uses fraudulent email messages designed to impersonate a legitimate person or organization and trick the recipient into downloading harmful attachments or divulging sensitive information. Identity Theft is the crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person’s name or identity to make transactions or purchases. The targets are usually high-level executives (CEOs, CFOs, COOs) or officers who regularly perform money transfers. Objective is to: - Retrieve confidential company or personal information. - Plant malware / ransom-ware. - Impersonate the email accounts of C-suite Executives. Stolen Information may include: —Security information —Employee Database —Data to compromise operations of the organization Denial of Service (DoS) attempts to overwhelm a server with web traffic and take the website offline. A DoS May be a Smokescreen Frequently used as a decoy to distract IT staff from an intrusion taking place at the same time. “It’s not a question if your network will be breached, the only question is when.” Be Aware. Be Prepared. Take Action.
  • 2. PHISHING & CYBER ATTACK AWARENESSDon’t Take the Bait. Learn how to Spot a Scam. Phishing( Homophone: fishing ) uses fraudulent email messages designed to impersonate a legitimate person or organization and trick the recipient into downloading harmful attachments or divulging sensitive information. “It’s not a question if your network will be breached, the only question is when.” Be Aware. Be Prepared. Take Action. Whattodo? Treat any email attachments with a healthy suspicion. In case of doubt, seek assistance from the IT Officer. In case of a compromise,immediately change yourpassword. Inform stakeholders about thescam to prevent any theft, breachor unauthorized transaction. Always encrypt email attachments containing sensitive information. Change email password every 3 months. Always check the Sender’s email address before taking on any sensitive transaction. Some phishing may also appear as Password Expiration Alert Embedded links in an email may redirect you to an unsecure website that requests sensitive information Report phishing email to the IT Officer.
  • 3. PHISHING & CYBER ATTACK AWARENESSDon’t Take the Bait. Learn how to Spot a Scam. Phishing( Homophone: fishing ) uses fraudulent email messages designed to impersonate a legitimate person or organization and trick the recipient into downloading harmful attachments or divulging sensitive information. “It’s not a question if your network will be breached, the only question is when.” Be Aware. Be Prepared. Take Action. Whattodo? Treat any email attachments with a healthy suspicion. In case of doubt, seek assistance from the IT Officer. In case of a compromise,immediately change yourpassword. Inform stakeholders about thescam to prevent any theft, breachor unauthorized transaction. Always encrypt email attachments containing sensitive information. Change email password every 3 months. Always check the Sender’s email address before taking on any sensitive transaction. Attachments may contain malware which can lead to data breach when opened. A Trojan via a malicious email attachment or ad may be installed which will allow attacker to exploit loopholes and obtain sensitive information. Report phishing email to the IT Officer.
  • 4. PHISHING & CYBER ATTACK AWARENESSDon’t Take the Bait. Learn how to Spot a Scam. Phishing( Homophone: fishing ) uses fraudulent email messages designed to impersonate a legitimate person or organization and trick the recipient into downloading harmful attachments or divulging sensitive information. “It’s not a question if your network will be breached, the only question is when.” Be Aware. Be Prepared. Take Action. Whattodo? Treat any email attachments with a healthy suspicion. In case of doubt, seek assistance from the IT Officer. In case of a compromise,immediately change yourpassword. Inform stakeholders about thescam to prevent any theft, breachor unauthorized transaction. Always encrypt email attachments containing sensitive information. Change email password every 3 months. Always check the Sender’s email address before taking on any sensitive transaction. Clicking links can authorize certain instructions leading to data breach or identity theft. Report phishing email to the IT Officer.
  • 5. PHISHING & CYBER ATTACK AWARENESSDon’t Take the Bait. Learn how to Spot a Scam. Phishing( Homophone: fishing ) uses fraudulent email messages designed to impersonate a legitimate person or organization and trick the recipient into downloading harmful attachments or divulging sensitive information. “It’s not a question if your network will be breached, the only question is when.” Be Aware. Be Prepared. Take Action. Whattodo? Treat any email attachments with a healthy suspicion. In case of doubt, seek assistance from the IT Officer. In case of a compromise,immediately change yourpassword. Inform stakeholders about thescam to prevent any theft, breachor unauthorized transaction. Always encrypt email attachments containing sensitive information. Change email password every 3 months. Always check the Sender’s email address before taking on any sensitive transaction. Clicking links can authorize certain instructions leading to data breach or identity theft. Report phishing email to the IT Officer.
  • 6. PHISHING & CYBER ATTACK AWARENESSDon’t Take the Bait. Learn how to Spot a Scam. Phishing( Homophone: fishing ) uses fraudulent email messages designed to impersonate a legitimate person or organization and trick the recipient into downloading harmful attachments or divulging sensitive information. “It’s not a question if your network will be breached, the only question is when.” Be Aware. Be Prepared. Take Action. Whattodo? Treat any email attachments with a healthy suspicion. In case of doubt, seek assistance from the IT Officer. In case of a compromise,immediately change yourpassword. Inform stakeholders about thescam to prevent any theft, breachor unauthorized transaction. Always encrypt email attachments containing sensitive information. Change email password every 3 months. Always check the Sender’s email address before taking on any sensitive transaction. Report phishing email to the IT Officer. Attackers spoof the email addresses of Senior Executives to appear as a reputable source and provide instructions to employees who normally or usually process fund transfer instructions.