SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
PHISHING
5 Ways to Tell
if an E-mail
is Legitimate
In today’s world of scammers and hackers,
it’s hard to keep up with all the various
ploys on the Internet aimed at stealing
personal or corporate information for
malicious reasons.
In today’s world of scammers and hackers,
it’s hard to keep up with all the various
ploys on the Internet aimed at stealing
personal or corporate information for
malicious reasons.
However, there are some ways to tell
if the e-mail you receive is a legitimate
communication or if it’s a scam.
THINK CRITICALLY
1
Do not accept that an e-mail is
the real deal just because you’re
busy, stressed, or have 150 other
unread messages in your inbox.
Stop for a minute and think about
the e-mail.
THINK CRITICALLY
1
Ask yourself:
• Does the e-mail come from someone I know?
• Was I expecting this e-mail?
• Are the requests being asked of me reasonable
or plausible?
• Does this e-mail employ emotional content
such as fear, greed, or curiosity, or, most
important, does it try to get me to take an action
(usually urgently)?
THINK CRITICALLY
1
LEARN TO HOVER
2
Simply move your mouse over
any link, but DO NOT CLICK IT!
Just let your mouse cursor hover
over the link and see what name
comes up.
Does it match the official
company website, or would it
take you elsewhere?
LEARN TO HOVER
2
DECIPHER THE URL
3
DECIPHER THE URL
3
you can assume it’s not legitimate.
If the e-mail includes a website address, look at
that URL to see if there’s anything unusual.
Amazon.com
For example, if an
e-mail claims to be from
but the URL ends in .ru
(a Russian domain
and not a real
Amazon address),
PRO TIPS
The next two tips are
aimed at businesses that
are quite large and have
dedicated information
security staff.
ANALYZE E-MAIL
HEADERS
4
E-mail headers tell you how an e-mail
got to your address.
If it’s a legit e-mail, the domain from the
header should match the domain given
in the e-mail. Likewise, the return path
and authentication results should
match the details given in the e-mail.
ANALYZE E-MAIL HEADERS
4
Sandbox e-mails
5
Sandboxing is a term used in the
tech field to describe creating an
environment where one can run
untested or untrusted code.
Many large companies use virtual machines to create
sandboxes, so e-mail or other applications can be
tested to determine whether they’re safe. Some
companies sandbox all incoming e-mail and only let
through those that are deemed safe and friendly.
SANDbOx E-MAILS
5
For more ways to defend
against phishing, check out
PHISHING
DARK WATERS
The Offensive and Defensive Sides
of Malicious E-mails
by Christopher Hadnagy and Michele Fincher

Más contenido relacionado

Más de Wiley

The Five Leadership Practices that Improve Sales Success
The Five Leadership Practices that Improve Sales SuccessThe Five Leadership Practices that Improve Sales Success
The Five Leadership Practices that Improve Sales SuccessWiley
 
7 Steps to Develop Well-Designed Course Objectives
7 Steps to Develop Well-Designed Course Objectives7 Steps to Develop Well-Designed Course Objectives
7 Steps to Develop Well-Designed Course ObjectivesWiley
 
Today's Students: 7 Powerful Facts
Today's Students: 7 Powerful FactsToday's Students: 7 Powerful Facts
Today's Students: 7 Powerful FactsWiley
 
Should you get an MBA?
Should you get an MBA?Should you get an MBA?
Should you get an MBA?Wiley
 
Valuing International Collaboration in Research
Valuing International Collaboration in ResearchValuing International Collaboration in Research
Valuing International Collaboration in ResearchWiley
 
Leadership Makes a Difference
Leadership Makes a DifferenceLeadership Makes a Difference
Leadership Makes a DifferenceWiley
 
5 Reasons to Earn Your CPA License WEL
5 Reasons to Earn Your CPA License WEL5 Reasons to Earn Your CPA License WEL
5 Reasons to Earn Your CPA License WELWiley
 
From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...
From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...
From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...Wiley
 
An Educator's Guide to Cheating
An Educator's Guide to CheatingAn Educator's Guide to Cheating
An Educator's Guide to CheatingWiley
 
Mine the Gap: Using Handouts With Gaps
Mine the Gap: Using Handouts With GapsMine the Gap: Using Handouts With Gaps
Mine the Gap: Using Handouts With GapsWiley
 
Get Your Students Motivated: Tips for the Classroom
Get Your Students Motivated: Tips for the ClassroomGet Your Students Motivated: Tips for the Classroom
Get Your Students Motivated: Tips for the ClassroomWiley
 
Level I CFA Exam 2017 Curriculum Updates
Level I CFA Exam 2017 Curriculum UpdatesLevel I CFA Exam 2017 Curriculum Updates
Level I CFA Exam 2017 Curriculum UpdatesWiley
 
6 Steps to Hire Someone with Soft Skills
6 Steps to Hire Someone with Soft Skills6 Steps to Hire Someone with Soft Skills
6 Steps to Hire Someone with Soft SkillsWiley
 
Student Voices, Part 3
Student Voices, Part 3Student Voices, Part 3
Student Voices, Part 3Wiley
 
Architectural Daylighting Strategies
Architectural Daylighting StrategiesArchitectural Daylighting Strategies
Architectural Daylighting StrategiesWiley
 
If I Were 22: Advice from those who've been there, done that
If I Were 22: Advice from those who've been there, done thatIf I Were 22: Advice from those who've been there, done that
If I Were 22: Advice from those who've been there, done thatWiley
 
Student Voices - Part 2
Student Voices - Part 2Student Voices - Part 2
Student Voices - Part 2Wiley
 
Develop a Leadership Culture in Your Organization
Develop a Leadership Culture in Your OrganizationDevelop a Leadership Culture in Your Organization
Develop a Leadership Culture in Your OrganizationWiley
 
All Exemplary Leaders Listen to Feedback
All Exemplary Leaders Listen to FeedbackAll Exemplary Leaders Listen to Feedback
All Exemplary Leaders Listen to FeedbackWiley
 
What makes a leader truly great?
What makes a leader truly great?What makes a leader truly great?
What makes a leader truly great?Wiley
 

Más de Wiley (20)

The Five Leadership Practices that Improve Sales Success
The Five Leadership Practices that Improve Sales SuccessThe Five Leadership Practices that Improve Sales Success
The Five Leadership Practices that Improve Sales Success
 
7 Steps to Develop Well-Designed Course Objectives
7 Steps to Develop Well-Designed Course Objectives7 Steps to Develop Well-Designed Course Objectives
7 Steps to Develop Well-Designed Course Objectives
 
Today's Students: 7 Powerful Facts
Today's Students: 7 Powerful FactsToday's Students: 7 Powerful Facts
Today's Students: 7 Powerful Facts
 
Should you get an MBA?
Should you get an MBA?Should you get an MBA?
Should you get an MBA?
 
Valuing International Collaboration in Research
Valuing International Collaboration in ResearchValuing International Collaboration in Research
Valuing International Collaboration in Research
 
Leadership Makes a Difference
Leadership Makes a DifferenceLeadership Makes a Difference
Leadership Makes a Difference
 
5 Reasons to Earn Your CPA License WEL
5 Reasons to Earn Your CPA License WEL5 Reasons to Earn Your CPA License WEL
5 Reasons to Earn Your CPA License WEL
 
From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...
From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...
From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...
 
An Educator's Guide to Cheating
An Educator's Guide to CheatingAn Educator's Guide to Cheating
An Educator's Guide to Cheating
 
Mine the Gap: Using Handouts With Gaps
Mine the Gap: Using Handouts With GapsMine the Gap: Using Handouts With Gaps
Mine the Gap: Using Handouts With Gaps
 
Get Your Students Motivated: Tips for the Classroom
Get Your Students Motivated: Tips for the ClassroomGet Your Students Motivated: Tips for the Classroom
Get Your Students Motivated: Tips for the Classroom
 
Level I CFA Exam 2017 Curriculum Updates
Level I CFA Exam 2017 Curriculum UpdatesLevel I CFA Exam 2017 Curriculum Updates
Level I CFA Exam 2017 Curriculum Updates
 
6 Steps to Hire Someone with Soft Skills
6 Steps to Hire Someone with Soft Skills6 Steps to Hire Someone with Soft Skills
6 Steps to Hire Someone with Soft Skills
 
Student Voices, Part 3
Student Voices, Part 3Student Voices, Part 3
Student Voices, Part 3
 
Architectural Daylighting Strategies
Architectural Daylighting StrategiesArchitectural Daylighting Strategies
Architectural Daylighting Strategies
 
If I Were 22: Advice from those who've been there, done that
If I Were 22: Advice from those who've been there, done thatIf I Were 22: Advice from those who've been there, done that
If I Were 22: Advice from those who've been there, done that
 
Student Voices - Part 2
Student Voices - Part 2Student Voices - Part 2
Student Voices - Part 2
 
Develop a Leadership Culture in Your Organization
Develop a Leadership Culture in Your OrganizationDevelop a Leadership Culture in Your Organization
Develop a Leadership Culture in Your Organization
 
All Exemplary Leaders Listen to Feedback
All Exemplary Leaders Listen to FeedbackAll Exemplary Leaders Listen to Feedback
All Exemplary Leaders Listen to Feedback
 
What makes a leader truly great?
What makes a leader truly great?What makes a leader truly great?
What makes a leader truly great?
 

Último

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Phishing: 5 Ways to Tell if an E-mail is Legit

  • 1. PHISHING 5 Ways to Tell if an E-mail is Legitimate
  • 2. In today’s world of scammers and hackers, it’s hard to keep up with all the various ploys on the Internet aimed at stealing personal or corporate information for malicious reasons.
  • 3. In today’s world of scammers and hackers, it’s hard to keep up with all the various ploys on the Internet aimed at stealing personal or corporate information for malicious reasons. However, there are some ways to tell if the e-mail you receive is a legitimate communication or if it’s a scam.
  • 5. Do not accept that an e-mail is the real deal just because you’re busy, stressed, or have 150 other unread messages in your inbox. Stop for a minute and think about the e-mail. THINK CRITICALLY 1
  • 6. Ask yourself: • Does the e-mail come from someone I know? • Was I expecting this e-mail? • Are the requests being asked of me reasonable or plausible? • Does this e-mail employ emotional content such as fear, greed, or curiosity, or, most important, does it try to get me to take an action (usually urgently)? THINK CRITICALLY 1
  • 8. Simply move your mouse over any link, but DO NOT CLICK IT! Just let your mouse cursor hover over the link and see what name comes up. Does it match the official company website, or would it take you elsewhere? LEARN TO HOVER 2
  • 10. DECIPHER THE URL 3 you can assume it’s not legitimate. If the e-mail includes a website address, look at that URL to see if there’s anything unusual. Amazon.com For example, if an e-mail claims to be from but the URL ends in .ru (a Russian domain and not a real Amazon address),
  • 11. PRO TIPS The next two tips are aimed at businesses that are quite large and have dedicated information security staff.
  • 13. E-mail headers tell you how an e-mail got to your address. If it’s a legit e-mail, the domain from the header should match the domain given in the e-mail. Likewise, the return path and authentication results should match the details given in the e-mail. ANALYZE E-MAIL HEADERS 4
  • 15. Sandboxing is a term used in the tech field to describe creating an environment where one can run untested or untrusted code. Many large companies use virtual machines to create sandboxes, so e-mail or other applications can be tested to determine whether they’re safe. Some companies sandbox all incoming e-mail and only let through those that are deemed safe and friendly. SANDbOx E-MAILS 5
  • 16. For more ways to defend against phishing, check out PHISHING DARK WATERS The Offensive and Defensive Sides of Malicious E-mails by Christopher Hadnagy and Michele Fincher