SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
PHISHING & CYBER
ATTACK AWARENESSDon’t Take the Bait. Learn how to Spot a Scam.
Phishing( Homophone: fishing )
uses fraudulent email messages designed to impersonate a
legitimate person or organization and trick the recipient into
downloading harmful attachments or divulging sensitive
information.
Identity Theft
is the crime of obtaining the personal or financial
information of another person for the sole purpose
of assuming that person’s name or identity to make
transactions or purchases.
The targets are usually high-level executives (CEOs, CFOs,
COOs) or officers who regularly perform money transfers.
Objective is to:
- Retrieve confidential company or personal information.
- Plant malware / ransom-ware.
- Impersonate the email accounts of C-suite Executives.
Stolen Information
may include:
—Security information
—Employee Database
—Data to compromise operations of the organization
Denial of Service (DoS)
attempts to overwhelm a server with web traffic and take
the website offline.
A DoS May be a Smokescreen
Frequently used as a decoy to distract IT staff from an
intrusion taking place at the same time.
“It’s not a question if your network will be
breached, the only question is when.”
Be Aware. Be Prepared. Take Action.
PHISHING & CYBER
ATTACK AWARENESSDon’t Take the Bait. Learn how to Spot a Scam.
Phishing( Homophone: fishing )
uses fraudulent email messages designed to impersonate a
legitimate person or organization and trick the recipient into
downloading harmful attachments or divulging sensitive
information.
“It’s not a question if your network will be
breached, the only question is when.”
Be Aware. Be Prepared. Take Action.
Whattodo?
Treat any email attachments
with a healthy suspicion.
In case of doubt,
seek assistance
from the IT Officer.
In case of a compromise,immediately change yourpassword.
Inform stakeholders about thescam to prevent any theft, breachor unauthorized transaction.
Always encrypt email
attachments containing
sensitive information.
Change email
password every
3 months.
Always check the Sender’s email
address before taking on any
sensitive transaction.
Some phishing may also appear as Password Expiration Alert
Embedded links in an email may redirect you to an unsecure
website that requests sensitive information
Report phishing
email to the IT
Officer.
PHISHING & CYBER
ATTACK AWARENESSDon’t Take the Bait. Learn how to Spot a Scam.
Phishing( Homophone: fishing )
uses fraudulent email messages designed to impersonate a
legitimate person or organization and trick the recipient into
downloading harmful attachments or divulging sensitive
information.
“It’s not a question if your network will be
breached, the only question is when.”
Be Aware. Be Prepared. Take Action.
Whattodo?
Treat any email attachments
with a healthy suspicion.
In case of doubt,
seek assistance
from the IT Officer.
In case of a compromise,immediately change yourpassword.
Inform stakeholders about thescam to prevent any theft, breachor unauthorized transaction.
Always encrypt email
attachments containing
sensitive information.
Change email
password every
3 months.
Always check the Sender’s email
address before taking on any
sensitive transaction.
Attachments may contain malware which can lead to data
breach when opened.
A Trojan via a malicious email attachment or ad may be
installed which will allow attacker to exploit loopholes and
obtain sensitive information.
Report phishing
email to the IT
Officer.
PHISHING & CYBER
ATTACK AWARENESSDon’t Take the Bait. Learn how to Spot a Scam.
Phishing( Homophone: fishing )
uses fraudulent email messages designed to impersonate a
legitimate person or organization and trick the recipient into
downloading harmful attachments or divulging sensitive
information.
“It’s not a question if your network will be
breached, the only question is when.”
Be Aware. Be Prepared. Take Action.
Whattodo?
Treat any email attachments
with a healthy suspicion.
In case of doubt,
seek assistance
from the IT Officer.
In case of a compromise,immediately change yourpassword.
Inform stakeholders about thescam to prevent any theft, breachor unauthorized transaction.
Always encrypt email
attachments containing
sensitive information.
Change email
password every
3 months.
Always check the Sender’s email
address before taking on any
sensitive transaction.
Clicking links can authorize certain instructions
leading to data breach or identity theft.
Report phishing
email to the IT
Officer.
PHISHING & CYBER
ATTACK AWARENESSDon’t Take the Bait. Learn how to Spot a Scam.
Phishing( Homophone: fishing )
uses fraudulent email messages designed to impersonate a
legitimate person or organization and trick the recipient into
downloading harmful attachments or divulging sensitive
information.
“It’s not a question if your network will be
breached, the only question is when.”
Be Aware. Be Prepared. Take Action.
Whattodo?
Treat any email attachments
with a healthy suspicion.
In case of doubt,
seek assistance
from the IT Officer.
In case of a compromise,immediately change yourpassword.
Inform stakeholders about thescam to prevent any theft, breachor unauthorized transaction.
Always encrypt email
attachments containing
sensitive information.
Change email
password every
3 months.
Always check the Sender’s email
address before taking on any
sensitive transaction.
Clicking links can authorize certain instructions
leading to data breach or identity theft.
Report phishing
email to the IT
Officer.
PHISHING & CYBER
ATTACK AWARENESSDon’t Take the Bait. Learn how to Spot a Scam.
Phishing( Homophone: fishing )
uses fraudulent email messages designed to impersonate a
legitimate person or organization and trick the recipient into
downloading harmful attachments or divulging sensitive
information.
“It’s not a question if your network will be
breached, the only question is when.”
Be Aware. Be Prepared. Take Action.
Whattodo?
Treat any email attachments
with a healthy suspicion.
In case of doubt,
seek assistance
from the IT Officer.
In case of a compromise,immediately change yourpassword.
Inform stakeholders about thescam to prevent any theft, breachor unauthorized transaction.
Always encrypt email
attachments containing
sensitive information.
Change email
password every
3 months.
Always check the Sender’s email
address before taking on any
sensitive transaction.
Report phishing
email to the IT
Officer.
Attackers spoof the email addresses of Senior Executives to
appear as a reputable source and provide instructions to
employees who normally or usually process fund
transfer instructions.

Más contenido relacionado

La actualidad más candente

Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
pooja_doshi
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
Arifa Ali
 

La actualidad más candente (20)

Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Data security
Data securityData security
Data security
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Social engineering
Social engineering Social engineering
Social engineering
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
cyber security
cyber securitycyber security
cyber security
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
(Open Sourced) Cyber Scavenger Hunt - Gamified Security Awareness, even on a ...
(Open Sourced) Cyber Scavenger Hunt - Gamified Security Awareness, even on a ...(Open Sourced) Cyber Scavenger Hunt - Gamified Security Awareness, even on a ...
(Open Sourced) Cyber Scavenger Hunt - Gamified Security Awareness, even on a ...
 
Webinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentationWebinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentation
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Vapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) servicesVapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) services
 

Similar a Phishing & Cyber Attack Awareness

Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
Krishma Sandesra
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
aleeya91
 

Similar a Phishing & Cyber Attack Awareness (20)

IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Phishing
PhishingPhishing
Phishing
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
Phishing mails: Bonnes pratiques
Phishing mails: Bonnes pratiques Phishing mails: Bonnes pratiques
Phishing mails: Bonnes pratiques
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Phishing
PhishingPhishing
Phishing
 
internet security
internet securityinternet security
internet security
 
Spamming and Hacking.pptx
Spamming and Hacking.pptxSpamming and Hacking.pptx
Spamming and Hacking.pptx
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 

Más de Kittelson & Carpo Consulting

Más de Kittelson & Carpo Consulting (20)

Things You Must Know About 13th-Month Pay
Things You Must Know About 13th-Month PayThings You Must Know About 13th-Month Pay
Things You Must Know About 13th-Month Pay
 
Starting a FinTech Company in the PH: The Ultimate Guide
Starting a FinTech Company in the PH: The Ultimate GuideStarting a FinTech Company in the PH: The Ultimate Guide
Starting a FinTech Company in the PH: The Ultimate Guide
 
Doing Business in the Philippines: Business Registration Process Made Simple
Doing Business in the Philippines: Business Registration Process Made SimpleDoing Business in the Philippines: Business Registration Process Made Simple
Doing Business in the Philippines: Business Registration Process Made Simple
 
Competitive Wages in the Philippines: Earn More and Explore!
Competitive Wages in the Philippines: Earn More and Explore! Competitive Wages in the Philippines: Earn More and Explore!
Competitive Wages in the Philippines: Earn More and Explore!
 
The Tax Reform for Acceleration and Inclusion Law or TRAIN Law
The Tax Reform for Acceleration and Inclusion Law or TRAIN LawThe Tax Reform for Acceleration and Inclusion Law or TRAIN Law
The Tax Reform for Acceleration and Inclusion Law or TRAIN Law
 
Data Privacy Act Update: Commit to Comply
Data Privacy Act Update: Commit to ComplyData Privacy Act Update: Commit to Comply
Data Privacy Act Update: Commit to Comply
 
Train Bill - Tax Reform for Accelaration and Inclusion
Train Bill - Tax Reform for Accelaration and InclusionTrain Bill - Tax Reform for Accelaration and Inclusion
Train Bill - Tax Reform for Accelaration and Inclusion
 
2017 National, Official, and Non-working Holidays in the Philippines
2017 National, Official, and Non-working Holidays in the Philippines2017 National, Official, and Non-working Holidays in the Philippines
2017 National, Official, and Non-working Holidays in the Philippines
 
Rules on-cpa-certificate-of-fs-preparation opt
Rules on-cpa-certificate-of-fs-preparation optRules on-cpa-certificate-of-fs-preparation opt
Rules on-cpa-certificate-of-fs-preparation opt
 
Provisional work visa in the Philippines
Provisional work visa in the PhilippinesProvisional work visa in the Philippines
Provisional work visa in the Philippines
 
How to beat the six second resume scan
How to beat the six second resume scanHow to beat the six second resume scan
How to beat the six second resume scan
 
Steps in reporting new employees to sss, philhealth, pag ibig, and bir
Steps in reporting new employees to sss, philhealth, pag ibig, and birSteps in reporting new employees to sss, philhealth, pag ibig, and bir
Steps in reporting new employees to sss, philhealth, pag ibig, and bir
 
7 Reasons why Accountants are important people in business
7 Reasons why Accountants are important people in business7 Reasons why Accountants are important people in business
7 Reasons why Accountants are important people in business
 
10 things to do before registering a business in the philippines
10 things to do before registering a business in the philippines10 things to do before registering a business in the philippines
10 things to do before registering a business in the philippines
 
Top 10 reasons why employees stay
Top 10 reasons why employees stayTop 10 reasons why employees stay
Top 10 reasons why employees stay
 
Visa Matters: Solving the Puzzle Behind Philippine Visas & Immigration
Visa Matters: Solving the Puzzle Behind Philippine Visas & ImmigrationVisa Matters: Solving the Puzzle Behind Philippine Visas & Immigration
Visa Matters: Solving the Puzzle Behind Philippine Visas & Immigration
 
Types of employment in the Philippines
Types of employment in the PhilippinesTypes of employment in the Philippines
Types of employment in the Philippines
 
Coffee mornings labor forum part 2: New DOLE Rules on Employee Termination
Coffee mornings  labor forum part 2: New DOLE Rules on Employee TerminationCoffee mornings  labor forum part 2: New DOLE Rules on Employee Termination
Coffee mornings labor forum part 2: New DOLE Rules on Employee Termination
 
Data privacy act of 2012 presentation
Data privacy act of 2012 presentationData privacy act of 2012 presentation
Data privacy act of 2012 presentation
 
Philippine Employment Law: Frequently Asked Questions
Philippine Employment Law: Frequently Asked QuestionsPhilippine Employment Law: Frequently Asked Questions
Philippine Employment Law: Frequently Asked Questions
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Último (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

Phishing & Cyber Attack Awareness

  • 1. PHISHING & CYBER ATTACK AWARENESSDon’t Take the Bait. Learn how to Spot a Scam. Phishing( Homophone: fishing ) uses fraudulent email messages designed to impersonate a legitimate person or organization and trick the recipient into downloading harmful attachments or divulging sensitive information. Identity Theft is the crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person’s name or identity to make transactions or purchases. The targets are usually high-level executives (CEOs, CFOs, COOs) or officers who regularly perform money transfers. Objective is to: - Retrieve confidential company or personal information. - Plant malware / ransom-ware. - Impersonate the email accounts of C-suite Executives. Stolen Information may include: —Security information —Employee Database —Data to compromise operations of the organization Denial of Service (DoS) attempts to overwhelm a server with web traffic and take the website offline. A DoS May be a Smokescreen Frequently used as a decoy to distract IT staff from an intrusion taking place at the same time. “It’s not a question if your network will be breached, the only question is when.” Be Aware. Be Prepared. Take Action.
  • 2. PHISHING & CYBER ATTACK AWARENESSDon’t Take the Bait. Learn how to Spot a Scam. Phishing( Homophone: fishing ) uses fraudulent email messages designed to impersonate a legitimate person or organization and trick the recipient into downloading harmful attachments or divulging sensitive information. “It’s not a question if your network will be breached, the only question is when.” Be Aware. Be Prepared. Take Action. Whattodo? Treat any email attachments with a healthy suspicion. In case of doubt, seek assistance from the IT Officer. In case of a compromise,immediately change yourpassword. Inform stakeholders about thescam to prevent any theft, breachor unauthorized transaction. Always encrypt email attachments containing sensitive information. Change email password every 3 months. Always check the Sender’s email address before taking on any sensitive transaction. Some phishing may also appear as Password Expiration Alert Embedded links in an email may redirect you to an unsecure website that requests sensitive information Report phishing email to the IT Officer.
  • 3. PHISHING & CYBER ATTACK AWARENESSDon’t Take the Bait. Learn how to Spot a Scam. Phishing( Homophone: fishing ) uses fraudulent email messages designed to impersonate a legitimate person or organization and trick the recipient into downloading harmful attachments or divulging sensitive information. “It’s not a question if your network will be breached, the only question is when.” Be Aware. Be Prepared. Take Action. Whattodo? Treat any email attachments with a healthy suspicion. In case of doubt, seek assistance from the IT Officer. In case of a compromise,immediately change yourpassword. Inform stakeholders about thescam to prevent any theft, breachor unauthorized transaction. Always encrypt email attachments containing sensitive information. Change email password every 3 months. Always check the Sender’s email address before taking on any sensitive transaction. Attachments may contain malware which can lead to data breach when opened. A Trojan via a malicious email attachment or ad may be installed which will allow attacker to exploit loopholes and obtain sensitive information. Report phishing email to the IT Officer.
  • 4. PHISHING & CYBER ATTACK AWARENESSDon’t Take the Bait. Learn how to Spot a Scam. Phishing( Homophone: fishing ) uses fraudulent email messages designed to impersonate a legitimate person or organization and trick the recipient into downloading harmful attachments or divulging sensitive information. “It’s not a question if your network will be breached, the only question is when.” Be Aware. Be Prepared. Take Action. Whattodo? Treat any email attachments with a healthy suspicion. In case of doubt, seek assistance from the IT Officer. In case of a compromise,immediately change yourpassword. Inform stakeholders about thescam to prevent any theft, breachor unauthorized transaction. Always encrypt email attachments containing sensitive information. Change email password every 3 months. Always check the Sender’s email address before taking on any sensitive transaction. Clicking links can authorize certain instructions leading to data breach or identity theft. Report phishing email to the IT Officer.
  • 5. PHISHING & CYBER ATTACK AWARENESSDon’t Take the Bait. Learn how to Spot a Scam. Phishing( Homophone: fishing ) uses fraudulent email messages designed to impersonate a legitimate person or organization and trick the recipient into downloading harmful attachments or divulging sensitive information. “It’s not a question if your network will be breached, the only question is when.” Be Aware. Be Prepared. Take Action. Whattodo? Treat any email attachments with a healthy suspicion. In case of doubt, seek assistance from the IT Officer. In case of a compromise,immediately change yourpassword. Inform stakeholders about thescam to prevent any theft, breachor unauthorized transaction. Always encrypt email attachments containing sensitive information. Change email password every 3 months. Always check the Sender’s email address before taking on any sensitive transaction. Clicking links can authorize certain instructions leading to data breach or identity theft. Report phishing email to the IT Officer.
  • 6. PHISHING & CYBER ATTACK AWARENESSDon’t Take the Bait. Learn how to Spot a Scam. Phishing( Homophone: fishing ) uses fraudulent email messages designed to impersonate a legitimate person or organization and trick the recipient into downloading harmful attachments or divulging sensitive information. “It’s not a question if your network will be breached, the only question is when.” Be Aware. Be Prepared. Take Action. Whattodo? Treat any email attachments with a healthy suspicion. In case of doubt, seek assistance from the IT Officer. In case of a compromise,immediately change yourpassword. Inform stakeholders about thescam to prevent any theft, breachor unauthorized transaction. Always encrypt email attachments containing sensitive information. Change email password every 3 months. Always check the Sender’s email address before taking on any sensitive transaction. Report phishing email to the IT Officer. Attackers spoof the email addresses of Senior Executives to appear as a reputable source and provide instructions to employees who normally or usually process fund transfer instructions.