SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
WHAT EVERY PHYSICIAN
NEEDS TO KNOW:
KEEPING YOUR EMAIL SECURE
THE PROBLEM
Phishing emails and other social engineering schemes
have become increasingly sophisticated and harder to
recognize.
These attacks are designed to trick people into
revealing sensitive information, downloading malware, or
committing financial fraud.
Cyber thieves often gather background information
on their targets from social media, blogs, and other
websites to appear more credible. Attackers then play on
emotional triggers such as fear, urgency, and authority to
trick their target into making impulsive decisions.
THE PROBLEM
Don’t take everything at face value. Before you open
and click an email, ask yourself these questions:
CRITICAL THINKING
CRITICAL THINKING
•	 Is the email from someone I recognize?
•	 Am I expecting the email?
•	 Are the requests in the email reasonable?
•	 Is the email using an emotional appeal (such as
causing fear or creating a sense of urgency) to entice
an action?
ALWAYS HOVER
Before clicking any links in the email, hover your mouse
over the link and the actual web address or URL will
appear. Do they match? If not, this may be a deceptive
link.
For example, you don’t want to click a link to ju-spandoo.
de/82359/index.html.
ALWAYS HOVER
Hackers will also try to spoof the URL to look like the
legitimate address. Investigate to make sure the domain
is the same as the sender of the email.
AVOID
•	 Never copy and paste the link into the URL section of
your browser to check it. That’s the same as clicking the
link.
•	 Never forward a suspected malicious email to other
people. You don’t want to further the potential damage,
especially within your organization.
AVOID
•	 Do not open the malicious email on your mobile device.
These devices are not immune to malware and viruses.
•	 Do not solely rely on antivirus (AV) software. AVs protect
against viruses with known signatures, but are susceptible
to new malware that goes undetected.
Source: NAS cyberNET from ePlace Solutions.
PARTNERSHIP
FOR A NEW ERA OF
MEDICINE
ABOUT TMLT:
With more than 20,000 health care professionals in its care, Texas Medical
Liability Trust (TMLT) provides malpractice insurance and related products
to physicians. Our purpose is to make a positive impact on the quality of
health care for patients by educating, protecting, and defending physicians.
www.tmlt.org
Find us on:

Contenu connexe

Tendances

10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness Program10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness ProgramWiley
 
CISA Issues Emotet Warning!
CISA Issues Emotet Warning!CISA Issues Emotet Warning!
CISA Issues Emotet Warning!Nicole Payne
 
Threat Detection: Recognizing Risks In Email And On The Web
Threat Detection: Recognizing Risks In Email And On The WebThreat Detection: Recognizing Risks In Email And On The Web
Threat Detection: Recognizing Risks In Email And On The WebDonald McArthur
 
CDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersCDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersNetLockSmith
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanControlScan, Inc.
 
How to identify unsafe websites
How to identify unsafe websitesHow to identify unsafe websites
How to identify unsafe websitesmaha5960
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threatsourav newatia
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550Liberteks
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalResham Acharya
 
"Beware COVID-19 Phishing Emails - Good Email Hygiene" Infographic
"Beware COVID-19 Phishing Emails - Good Email Hygiene" Infographic"Beware COVID-19 Phishing Emails - Good Email Hygiene" Infographic
"Beware COVID-19 Phishing Emails - Good Email Hygiene" InfographicDavid McHale
 

Tendances (20)

10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness Program10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness Program
 
CISA Issues Emotet Warning!
CISA Issues Emotet Warning!CISA Issues Emotet Warning!
CISA Issues Emotet Warning!
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
Security At Home
Security At HomeSecurity At Home
Security At Home
 
Threat Detection: Recognizing Risks In Email And On The Web
Threat Detection: Recognizing Risks In Email And On The WebThreat Detection: Recognizing Risks In Email And On The Web
Threat Detection: Recognizing Risks In Email And On The Web
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersCDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness Posters
 
Phishing Technology
Phishing TechnologyPhishing Technology
Phishing Technology
 
Phishing
PhishingPhishing
Phishing
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Cyber security
Cyber securityCyber security
Cyber security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing
PhishingPhishing
Phishing
 
How to identify unsafe websites
How to identify unsafe websitesHow to identify unsafe websites
How to identify unsafe websites
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
"Beware COVID-19 Phishing Emails - Good Email Hygiene" Infographic
"Beware COVID-19 Phishing Emails - Good Email Hygiene" Infographic"Beware COVID-19 Phishing Emails - Good Email Hygiene" Infographic
"Beware COVID-19 Phishing Emails - Good Email Hygiene" Infographic
 
Social engineering final
Social engineering finalSocial engineering final
Social engineering final
 

Similaire à Keeping Your Email Secure

IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUBilly Warero
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitssuser64f8f8
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
Security awareness
Security awarenessSecurity awareness
Security awarenessSanoop Nair
 
How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?Ankush Sarkar
 
Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? The TNS Group
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacksNamik Heydarov
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Alexandru Turcu
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.pptErAdityaSingh1
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesArnav Chowdhury
 
Data Security: A Guide To Whale Phishing
Data Security: A Guide To Whale PhishingData Security: A Guide To Whale Phishing
Data Security: A Guide To Whale PhishingPhil Astell
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptSukhdev48
 

Similaire à Keeping Your Email Secure (20)

IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
How to Detect Email Fraud
How to Detect Email FraudHow to Detect Email Fraud
How to Detect Email Fraud
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?
 
Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You?
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
 
Phishing
PhishingPhishing
Phishing
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
Data Security: A Guide To Whale Phishing
Data Security: A Guide To Whale PhishingData Security: A Guide To Whale Phishing
Data Security: A Guide To Whale Phishing
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 

Plus de Texas Medical Liability Trust

Plus de Texas Medical Liability Trust (20)

TMB pain management rules
TMB pain management rulesTMB pain management rules
TMB pain management rules
 
Telemedicine: Managing your risks
Telemedicine: Managing your risksTelemedicine: Managing your risks
Telemedicine: Managing your risks
 
Cultural Competency
Cultural CompetencyCultural Competency
Cultural Competency
 
COVID-19 Re-opening Your Practice
COVID-19 Re-opening Your PracticeCOVID-19 Re-opening Your Practice
COVID-19 Re-opening Your Practice
 
Texas COVID-19 regulatory changes
Texas COVID-19 regulatory changesTexas COVID-19 regulatory changes
Texas COVID-19 regulatory changes
 
Strategies to Improve Patient Follow Up
Strategies to Improve Patient Follow UpStrategies to Improve Patient Follow Up
Strategies to Improve Patient Follow Up
 
Telemedicine and Telehealth
Telemedicine and TelehealthTelemedicine and Telehealth
Telemedicine and Telehealth
 
Medical Malpractice Claim Trends
Medical Malpractice Claim TrendsMedical Malpractice Claim Trends
Medical Malpractice Claim Trends
 
10 Things That Compromise Patient Data
10 Things That Compromise Patient Data10 Things That Compromise Patient Data
10 Things That Compromise Patient Data
 
Human Trafficking, Part 2
Human Trafficking, Part 2Human Trafficking, Part 2
Human Trafficking, Part 2
 
Human Trafficking, Part 1
Human Trafficking, Part 1Human Trafficking, Part 1
Human Trafficking, Part 1
 
Risk Management Trends
Risk Management TrendsRisk Management Trends
Risk Management Trends
 
Ransomware attacks
Ransomware attacksRansomware attacks
Ransomware attacks
 
Addressing transgender health care disparities
Addressing transgender health care disparitiesAddressing transgender health care disparities
Addressing transgender health care disparities
 
Case Closed: HIPAA and patient privacy
Case Closed: HIPAA and patient privacyCase Closed: HIPAA and patient privacy
Case Closed: HIPAA and patient privacy
 
Googling Your Patients
Googling Your PatientsGoogling Your Patients
Googling Your Patients
 
CDC Guidelines for Prescribing Opioids
CDC Guidelines for Prescribing OpioidsCDC Guidelines for Prescribing Opioids
CDC Guidelines for Prescribing Opioids
 
Top 10 Risk Management Recommendations
Top 10 Risk Management RecommendationsTop 10 Risk Management Recommendations
Top 10 Risk Management Recommendations
 
Combating Physician Stress and Burnout
Combating Physician Stress and BurnoutCombating Physician Stress and Burnout
Combating Physician Stress and Burnout
 
Wernicke's Encephalopathy After Bariatric Surgery
Wernicke's Encephalopathy After Bariatric SurgeryWernicke's Encephalopathy After Bariatric Surgery
Wernicke's Encephalopathy After Bariatric Surgery
 

Dernier

Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Dernier (20)

Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Keeping Your Email Secure

  • 1. WHAT EVERY PHYSICIAN NEEDS TO KNOW: KEEPING YOUR EMAIL SECURE
  • 2. THE PROBLEM Phishing emails and other social engineering schemes have become increasingly sophisticated and harder to recognize. These attacks are designed to trick people into revealing sensitive information, downloading malware, or committing financial fraud.
  • 3. Cyber thieves often gather background information on their targets from social media, blogs, and other websites to appear more credible. Attackers then play on emotional triggers such as fear, urgency, and authority to trick their target into making impulsive decisions. THE PROBLEM
  • 4. Don’t take everything at face value. Before you open and click an email, ask yourself these questions: CRITICAL THINKING
  • 5. CRITICAL THINKING • Is the email from someone I recognize? • Am I expecting the email? • Are the requests in the email reasonable? • Is the email using an emotional appeal (such as causing fear or creating a sense of urgency) to entice an action?
  • 6. ALWAYS HOVER Before clicking any links in the email, hover your mouse over the link and the actual web address or URL will appear. Do they match? If not, this may be a deceptive link. For example, you don’t want to click a link to ju-spandoo. de/82359/index.html.
  • 7. ALWAYS HOVER Hackers will also try to spoof the URL to look like the legitimate address. Investigate to make sure the domain is the same as the sender of the email.
  • 8. AVOID • Never copy and paste the link into the URL section of your browser to check it. That’s the same as clicking the link. • Never forward a suspected malicious email to other people. You don’t want to further the potential damage, especially within your organization.
  • 9. AVOID • Do not open the malicious email on your mobile device. These devices are not immune to malware and viruses. • Do not solely rely on antivirus (AV) software. AVs protect against viruses with known signatures, but are susceptible to new malware that goes undetected. Source: NAS cyberNET from ePlace Solutions.
  • 10. PARTNERSHIP FOR A NEW ERA OF MEDICINE ABOUT TMLT: With more than 20,000 health care professionals in its care, Texas Medical Liability Trust (TMLT) provides malpractice insurance and related products to physicians. Our purpose is to make a positive impact on the quality of health care for patients by educating, protecting, and defending physicians. www.tmlt.org Find us on: