SlideShare a Scribd company logo
1 of 10
Download to read offline
PHISHING
EMAILS
What To Do If
You Click on a
Suspicious Link
We’ve all done it.
Even security pros make mistakes
when they’re tired or busy! If you’ve
clicked on something you shouldn’t
have, don’t panic. There are steps
you can take to correct the
problems that may arise.
If you’re part of a company,
call your IT department or
security department and
report the incident; this can
save you and your company
lots of time, headaches, and
problems down the road.
1
If you’re not part of a company,
think back to what was asked
of you when you clicked.
	Were you asked for some sort
of account credentials?
	Were you asked to enter
a username and password?
	Were you asked to download a
file and install a ‘program’?
2
If the site asked you for an
account, and you entered
the credentials or you
entered a new username
and password, then you
have to take some pretty
quick and decisive action.
First, you need to determine if
you use that same user ID and
password combo anywhere
else. If you do, immediately go
to those places and change
your username and password.
3
If you have an account with
the company mentioned in the
e-mail and entered those
credentials, call the company to tell
them that you might have given your
credentials to a nefarious group. Get
the company to change your
credentials immediately to help make
sure your account is safe.
4
Monitor your important
accounts and make sure
nothing ‘funky’ is going on.
Change your passwords
in those key accounts to give
you maximum protection.
5
If you installed a program as a result
of the e-mail, there’s a good chance
you might have installed a virus,
Trojan horse, or other malicious piece
of software.
You need to clean your computer
and change most of your account
usernames and passwords on another
clean machine (or you can do it on your
own machine right after you clean it).
Call a professional and seek some
help if you don’t know what to do with
viruses and malware.
6
You need to do these things as
soon as possible, but freaking out
only makes a bad situation worse.
Take a deep breath, form a plan of
action, and fix the things that can
be fixed immediately to stop any
further harm from occurring.
For more ways to protect
against phishing, check out
PHISHING
DARK WATERS
The Offensive and Defensive Sides
of Malicious E-mails
by Christopher Hadnagy and Michele Fincher

More Related Content

Viewers also liked

Student Voices, Part 3
Student Voices, Part 3Student Voices, Part 3
Student Voices, Part 3Wiley
 
An Educator's Guide to Cheating
An Educator's Guide to CheatingAn Educator's Guide to Cheating
An Educator's Guide to CheatingWiley
 
5 Reasons to Earn Your CPA License WEL
5 Reasons to Earn Your CPA License WEL5 Reasons to Earn Your CPA License WEL
5 Reasons to Earn Your CPA License WELWiley
 
Design Principles of Excel Dashboards & Reports
Design Principles of Excel Dashboards & ReportsDesign Principles of Excel Dashboards & Reports
Design Principles of Excel Dashboards & ReportsWiley
 
Take A Tour of 5 Cities Through the Lens of Top Geographers
Take A Tour of 5 Cities Through the Lens of Top GeographersTake A Tour of 5 Cities Through the Lens of Top Geographers
Take A Tour of 5 Cities Through the Lens of Top GeographersWiley
 
Leadership Makes a Difference
Leadership Makes a DifferenceLeadership Makes a Difference
Leadership Makes a DifferenceWiley
 

Viewers also liked (6)

Student Voices, Part 3
Student Voices, Part 3Student Voices, Part 3
Student Voices, Part 3
 
An Educator's Guide to Cheating
An Educator's Guide to CheatingAn Educator's Guide to Cheating
An Educator's Guide to Cheating
 
5 Reasons to Earn Your CPA License WEL
5 Reasons to Earn Your CPA License WEL5 Reasons to Earn Your CPA License WEL
5 Reasons to Earn Your CPA License WEL
 
Design Principles of Excel Dashboards & Reports
Design Principles of Excel Dashboards & ReportsDesign Principles of Excel Dashboards & Reports
Design Principles of Excel Dashboards & Reports
 
Take A Tour of 5 Cities Through the Lens of Top Geographers
Take A Tour of 5 Cities Through the Lens of Top GeographersTake A Tour of 5 Cities Through the Lens of Top Geographers
Take A Tour of 5 Cities Through the Lens of Top Geographers
 
Leadership Makes a Difference
Leadership Makes a DifferenceLeadership Makes a Difference
Leadership Makes a Difference
 

More from Wiley

Publisher as Strategic Partner for Societies October 2019
Publisher as Strategic Partner for Societies October 2019Publisher as Strategic Partner for Societies October 2019
Publisher as Strategic Partner for Societies October 2019Wiley
 
19 Inspiring Books by Jon Gordon
19 Inspiring Books by Jon Gordon19 Inspiring Books by Jon Gordon
19 Inspiring Books by Jon GordonWiley
 
3 Big Myths That Hold Women Back
3 Big Myths That Hold Women Back3 Big Myths That Hold Women Back
3 Big Myths That Hold Women BackWiley
 
The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...
The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...
The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...Wiley
 
The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...
The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...
The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...Wiley
 
A Celebration of Women's History Month
A Celebration of Women's History MonthA Celebration of Women's History Month
A Celebration of Women's History MonthWiley
 
Leadership Is for Everyone
Leadership Is for EveryoneLeadership Is for Everyone
Leadership Is for EveryoneWiley
 
The Five Leadership Practices that Improve Sales Success
The Five Leadership Practices that Improve Sales SuccessThe Five Leadership Practices that Improve Sales Success
The Five Leadership Practices that Improve Sales SuccessWiley
 
7 Steps to Develop Well-Designed Course Objectives
7 Steps to Develop Well-Designed Course Objectives7 Steps to Develop Well-Designed Course Objectives
7 Steps to Develop Well-Designed Course ObjectivesWiley
 
Today's Students: 7 Powerful Facts
Today's Students: 7 Powerful FactsToday's Students: 7 Powerful Facts
Today's Students: 7 Powerful FactsWiley
 
Should you get an MBA?
Should you get an MBA?Should you get an MBA?
Should you get an MBA?Wiley
 
Valuing International Collaboration in Research
Valuing International Collaboration in ResearchValuing International Collaboration in Research
Valuing International Collaboration in ResearchWiley
 
Mine the Gap: Using Handouts With Gaps
Mine the Gap: Using Handouts With GapsMine the Gap: Using Handouts With Gaps
Mine the Gap: Using Handouts With GapsWiley
 
Get Your Students Motivated: Tips for the Classroom
Get Your Students Motivated: Tips for the ClassroomGet Your Students Motivated: Tips for the Classroom
Get Your Students Motivated: Tips for the ClassroomWiley
 
Level I CFA Exam 2017 Curriculum Updates
Level I CFA Exam 2017 Curriculum UpdatesLevel I CFA Exam 2017 Curriculum Updates
Level I CFA Exam 2017 Curriculum UpdatesWiley
 
6 Steps to Hire Someone with Soft Skills
6 Steps to Hire Someone with Soft Skills6 Steps to Hire Someone with Soft Skills
6 Steps to Hire Someone with Soft SkillsWiley
 
Architectural Daylighting Strategies
Architectural Daylighting StrategiesArchitectural Daylighting Strategies
Architectural Daylighting StrategiesWiley
 
If I Were 22: Advice from those who've been there, done that
If I Were 22: Advice from those who've been there, done thatIf I Were 22: Advice from those who've been there, done that
If I Were 22: Advice from those who've been there, done thatWiley
 
Student Voices - Part 2
Student Voices - Part 2Student Voices - Part 2
Student Voices - Part 2Wiley
 
Develop a Leadership Culture in Your Organization
Develop a Leadership Culture in Your OrganizationDevelop a Leadership Culture in Your Organization
Develop a Leadership Culture in Your OrganizationWiley
 

More from Wiley (20)

Publisher as Strategic Partner for Societies October 2019
Publisher as Strategic Partner for Societies October 2019Publisher as Strategic Partner for Societies October 2019
Publisher as Strategic Partner for Societies October 2019
 
19 Inspiring Books by Jon Gordon
19 Inspiring Books by Jon Gordon19 Inspiring Books by Jon Gordon
19 Inspiring Books by Jon Gordon
 
3 Big Myths That Hold Women Back
3 Big Myths That Hold Women Back3 Big Myths That Hold Women Back
3 Big Myths That Hold Women Back
 
The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...
The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...
The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...
 
The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...
The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...
The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...
 
A Celebration of Women's History Month
A Celebration of Women's History MonthA Celebration of Women's History Month
A Celebration of Women's History Month
 
Leadership Is for Everyone
Leadership Is for EveryoneLeadership Is for Everyone
Leadership Is for Everyone
 
The Five Leadership Practices that Improve Sales Success
The Five Leadership Practices that Improve Sales SuccessThe Five Leadership Practices that Improve Sales Success
The Five Leadership Practices that Improve Sales Success
 
7 Steps to Develop Well-Designed Course Objectives
7 Steps to Develop Well-Designed Course Objectives7 Steps to Develop Well-Designed Course Objectives
7 Steps to Develop Well-Designed Course Objectives
 
Today's Students: 7 Powerful Facts
Today's Students: 7 Powerful FactsToday's Students: 7 Powerful Facts
Today's Students: 7 Powerful Facts
 
Should you get an MBA?
Should you get an MBA?Should you get an MBA?
Should you get an MBA?
 
Valuing International Collaboration in Research
Valuing International Collaboration in ResearchValuing International Collaboration in Research
Valuing International Collaboration in Research
 
Mine the Gap: Using Handouts With Gaps
Mine the Gap: Using Handouts With GapsMine the Gap: Using Handouts With Gaps
Mine the Gap: Using Handouts With Gaps
 
Get Your Students Motivated: Tips for the Classroom
Get Your Students Motivated: Tips for the ClassroomGet Your Students Motivated: Tips for the Classroom
Get Your Students Motivated: Tips for the Classroom
 
Level I CFA Exam 2017 Curriculum Updates
Level I CFA Exam 2017 Curriculum UpdatesLevel I CFA Exam 2017 Curriculum Updates
Level I CFA Exam 2017 Curriculum Updates
 
6 Steps to Hire Someone with Soft Skills
6 Steps to Hire Someone with Soft Skills6 Steps to Hire Someone with Soft Skills
6 Steps to Hire Someone with Soft Skills
 
Architectural Daylighting Strategies
Architectural Daylighting StrategiesArchitectural Daylighting Strategies
Architectural Daylighting Strategies
 
If I Were 22: Advice from those who've been there, done that
If I Were 22: Advice from those who've been there, done thatIf I Were 22: Advice from those who've been there, done that
If I Were 22: Advice from those who've been there, done that
 
Student Voices - Part 2
Student Voices - Part 2Student Voices - Part 2
Student Voices - Part 2
 
Develop a Leadership Culture in Your Organization
Develop a Leadership Culture in Your OrganizationDevelop a Leadership Culture in Your Organization
Develop a Leadership Culture in Your Organization
 

Recently uploaded

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

What to Do if You Click on a Suspicious Link

  • 1. PHISHING EMAILS What To Do If You Click on a Suspicious Link
  • 2. We’ve all done it. Even security pros make mistakes when they’re tired or busy! If you’ve clicked on something you shouldn’t have, don’t panic. There are steps you can take to correct the problems that may arise.
  • 3. If you’re part of a company, call your IT department or security department and report the incident; this can save you and your company lots of time, headaches, and problems down the road. 1
  • 4. If you’re not part of a company, think back to what was asked of you when you clicked. Were you asked for some sort of account credentials? Were you asked to enter a username and password? Were you asked to download a file and install a ‘program’? 2
  • 5. If the site asked you for an account, and you entered the credentials or you entered a new username and password, then you have to take some pretty quick and decisive action. First, you need to determine if you use that same user ID and password combo anywhere else. If you do, immediately go to those places and change your username and password. 3
  • 6. If you have an account with the company mentioned in the e-mail and entered those credentials, call the company to tell them that you might have given your credentials to a nefarious group. Get the company to change your credentials immediately to help make sure your account is safe. 4
  • 7. Monitor your important accounts and make sure nothing ‘funky’ is going on. Change your passwords in those key accounts to give you maximum protection. 5
  • 8. If you installed a program as a result of the e-mail, there’s a good chance you might have installed a virus, Trojan horse, or other malicious piece of software. You need to clean your computer and change most of your account usernames and passwords on another clean machine (or you can do it on your own machine right after you clean it). Call a professional and seek some help if you don’t know what to do with viruses and malware. 6
  • 9. You need to do these things as soon as possible, but freaking out only makes a bad situation worse. Take a deep breath, form a plan of action, and fix the things that can be fixed immediately to stop any further harm from occurring.
  • 10. For more ways to protect against phishing, check out PHISHING DARK WATERS The Offensive and Defensive Sides of Malicious E-mails by Christopher Hadnagy and Michele Fincher