SlideShare una empresa de Scribd logo
1 de 9
An ITS Security Training Module Version Oct 2009 v3 CLICK “FULL” TO VIEW SLIDE IN FULL SCREEN.
You’ve Got Mail! When in doubt, throw it out.
Suspicious email opened…Now What? Section: You’ve Got Mail! If you… then you should… responded to a phishing email… entered your password on a suspect Web site… provided your password in an email…  Call (919.962.HELP) immediately! Change your Onyen password at https://onyen.unc.edu/ Save the phishing email to which you responded as it may help with troubleshooting.
Safe E-mail 101 Section: You’ve Got Mail! Never send your password over email.  UNC-Chapel Hill will NEVER send you an email asking for your password in response.  Such attempts to get you to disclose your password are known as “phishing”.  Do NOT click on links or attachments from unsolicited or in unusual email.  Use common sense: Do not click on the link or open the attachment. When in doubt, throw it out.
Safe E-mail 101 Section: You’ve Got Mail! Do not respond to “spam.”  Discard or delete it.  Do not use any “unsubscribe” feature in the spam.  Do not purchase anything offered for sale in spam. Do not use E-mail to send Sensitive Information.  Contact your IT department or the Information Security Office for more information on how to email securely.
What Is Computer Spam? Section: You’ve Got Mail! “Spam” is the term used to describe unsolicited or “junk” electronic mail.
SpamWhat’s the Big Deal? Section: You’ve Got Mail! may contain viruses, spyware, inappropriate material, or “scams” clogs email systems includes phishing, a form of spam that tries to elicit Sensitive Information such as passwords. UNC-Chapel Hill will NEVER ask you to disclose passwords, social security numbers or other Sensitive Information via email.
Learning Point # 11 Section: You’ve Got Mail! You receive an email from the University’s Information Technology Services (ITS) asking for a verification of your login information. You should respond to the email and provide the requested information. Right? Wrong!ITS will never ask for login informationto be disclosed in an email. Login information, such as your Onyen and password, is considered Sensitive Information and should never be sent in an email. E-mail addresses can be spoofed, making them appear to be from a legitimate sender. If in doubt, contact 962-HELP to determinewhether an email is authentic.
Learning Point # 12 Section: You’ve Got Mail! Spam is annoying, but it poses no threat. Some of the spam messages are actually links to interesting Web sites for purchasing computer products. Right? Wrong! Spam may contain malware or involve scams that solicit personal information, such as credit card information. Spam that contains links to scam Web sites harvesting Sensitive Information is called phishing.

Más contenido relacionado

Similar a Security Awareness 9-10-09 v5 You've Got Mail

Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
Payza
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
amby3
 
Internet Safety Emmabalison
Internet Safety EmmabalisonInternet Safety Emmabalison
Internet Safety Emmabalison
guest13f93438
 

Similar a Security Awareness 9-10-09 v5 You've Got Mail (20)

IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 
S_A_T.pptx
S_A_T.pptxS_A_T.pptx
S_A_T.pptx
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
Phishing
PhishingPhishing
Phishing
 
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptxOnline Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
 
How to Detect Email Fraud
How to Detect Email FraudHow to Detect Email Fraud
How to Detect Email Fraud
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Common Email Security Mistakes
Common Email Security MistakesCommon Email Security Mistakes
Common Email Security Mistakes
 
Avoiding IRS Scams during Tax Season
Avoiding IRS Scams during Tax SeasonAvoiding IRS Scams during Tax Season
Avoiding IRS Scams during Tax Season
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Phishing mails: Bonnes pratiques
Phishing mails: Bonnes pratiques Phishing mails: Bonnes pratiques
Phishing mails: Bonnes pratiques
 
Internet Safety Emmabalison
Internet Safety EmmabalisonInternet Safety Emmabalison
Internet Safety Emmabalison
 

Más de Catherine MacAllister (10)

Security Awareness 9-10-09 v5 Overview
Security Awareness 9-10-09 v5 OverviewSecurity Awareness 9-10-09 v5 Overview
Security Awareness 9-10-09 v5 Overview
 
Security Awareness 9-10-09 v5 Appropriate Disposal
Security Awareness 9-10-09 v5 Appropriate DisposalSecurity Awareness 9-10-09 v5 Appropriate Disposal
Security Awareness 9-10-09 v5 Appropriate Disposal
 
Security Awareness 9-10-09 v5 Protect Equipment
Security Awareness 9-10-09 v5 Protect EquipmentSecurity Awareness 9-10-09 v5 Protect Equipment
Security Awareness 9-10-09 v5 Protect Equipment
 
Security Awareness 9-10-09 v5 Web Browser
Security Awareness 9-10-09 v5 Web BrowserSecurity Awareness 9-10-09 v5 Web Browser
Security Awareness 9-10-09 v5 Web Browser
 
Security Awareness 9-10-09 v5 Wireless
Security Awareness 9-10-09 v5 WirelessSecurity Awareness 9-10-09 v5 Wireless
Security Awareness 9-10-09 v5 Wireless
 
Security Awareness 9-10-09 v5 Sensitive Information
Security Awareness 9-10-09 v5 Sensitive InformationSecurity Awareness 9-10-09 v5 Sensitive Information
Security Awareness 9-10-09 v5 Sensitive Information
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
 
Security Awareness 9 10 09 V4 Appropriate Disposal
Security Awareness 9 10 09  V4  Appropriate  DisposalSecurity Awareness 9 10 09  V4  Appropriate  Disposal
Security Awareness 9 10 09 V4 Appropriate Disposal
 
Security Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless ConnectionsSecurity Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless Connections
 
Security Awareness 9 10 09 V4 Workplace Policies
Security Awareness 9 10 09 V4 Workplace PoliciesSecurity Awareness 9 10 09 V4 Workplace Policies
Security Awareness 9 10 09 V4 Workplace Policies
 

Último

Último (20)

How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

Security Awareness 9-10-09 v5 You've Got Mail

  • 1. An ITS Security Training Module Version Oct 2009 v3 CLICK “FULL” TO VIEW SLIDE IN FULL SCREEN.
  • 2. You’ve Got Mail! When in doubt, throw it out.
  • 3. Suspicious email opened…Now What? Section: You’ve Got Mail! If you… then you should… responded to a phishing email… entered your password on a suspect Web site… provided your password in an email… Call (919.962.HELP) immediately! Change your Onyen password at https://onyen.unc.edu/ Save the phishing email to which you responded as it may help with troubleshooting.
  • 4. Safe E-mail 101 Section: You’ve Got Mail! Never send your password over email. UNC-Chapel Hill will NEVER send you an email asking for your password in response. Such attempts to get you to disclose your password are known as “phishing”. Do NOT click on links or attachments from unsolicited or in unusual email. Use common sense: Do not click on the link or open the attachment. When in doubt, throw it out.
  • 5. Safe E-mail 101 Section: You’ve Got Mail! Do not respond to “spam.” Discard or delete it. Do not use any “unsubscribe” feature in the spam. Do not purchase anything offered for sale in spam. Do not use E-mail to send Sensitive Information. Contact your IT department or the Information Security Office for more information on how to email securely.
  • 6. What Is Computer Spam? Section: You’ve Got Mail! “Spam” is the term used to describe unsolicited or “junk” electronic mail.
  • 7. SpamWhat’s the Big Deal? Section: You’ve Got Mail! may contain viruses, spyware, inappropriate material, or “scams” clogs email systems includes phishing, a form of spam that tries to elicit Sensitive Information such as passwords. UNC-Chapel Hill will NEVER ask you to disclose passwords, social security numbers or other Sensitive Information via email.
  • 8. Learning Point # 11 Section: You’ve Got Mail! You receive an email from the University’s Information Technology Services (ITS) asking for a verification of your login information. You should respond to the email and provide the requested information. Right? Wrong!ITS will never ask for login informationto be disclosed in an email. Login information, such as your Onyen and password, is considered Sensitive Information and should never be sent in an email. E-mail addresses can be spoofed, making them appear to be from a legitimate sender. If in doubt, contact 962-HELP to determinewhether an email is authentic.
  • 9. Learning Point # 12 Section: You’ve Got Mail! Spam is annoying, but it poses no threat. Some of the spam messages are actually links to interesting Web sites for purchasing computer products. Right? Wrong! Spam may contain malware or involve scams that solicit personal information, such as credit card information. Spam that contains links to scam Web sites harvesting Sensitive Information is called phishing.