tha security awareness training

Post on 21-Jan-2018

263 Views

Category:

Technology

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

The link you clicked on was part of a

phishing awareness campaign.The following is for your education, so please continue

through this exercise. You will learn about the risks of

phishing and some common traits to help identify phishing

attacks. Please read each slide carefully and completely.

What is Phishing?( hint: it’s tricking an end user via a fake email! )

What is Phishing?Phishing refers to emails sent to legitimate email

accounts, constructed to simulate REAL email

messages, in hopes that unsuspecting, trusting

users will “click” on a link or open an infected

attachment. The perpetrators are “phishing” for

usernames and passwords so that they can gain

access to the corporate network.

Phishing Emails Work

50%open emails and

click on phishing

links within the

first hour

11%click on

attachments

Two thirds of

incidents feature

phishing Phishing is

the most

used tactic in

Cyber-Espionage

91%of targeted

attacks use

spear-phishing

emails.

What can be done?

Improved

e-mail filtering

(technology)

Human sensor

network

(YOU!)

A NETWORK OF HUMAN SENSORS ARE MORE EFFECTIVE AT

DETECTING PHISHING ATTACKS THAN ALMOST ANY TECHNOLOGY

Source: 2015 Verizon Data Breach Investigations Report

Phishing in the News

Phishing

in the

News

A single victim

of a phishing

attack can

impact on

millions.

Phishing

in the

News

No Company

Is Immune!Even security

companies can

fall victim.

Phishing

Attacks

Look Real

Phishing

Attacks

Look Real

Phishing

Attacks

Look Real

Phishing

Attacks

Look Real

Phishing

Attacks

Look Real

What can you do?

Know the signs

of a phishing

attack

Report phishing

attacks to the IT

Department

How to

detect a

Phishing

email

Common Phishing Traits

1

2

3

4

5

6

1. Generic greeting

2. Invokes fear

3. Requires action

4. Threatening language

5. Grammar issues

6. Generic closing

DO hover over links verify its location

DO NOT click on unknown links

DO NOT reply to suspicious requests

DO report the suspected attack

What to do?

When in doubt, contact the

I.T. department or Your Supervisor

DO NOT CLICK, RESPOND OR DOWNLOAD!

Courtesy: Action Fraud and the National Fraud Intelligence Bureau

Thank you for your attention

and participation.

If you have questions or wish to provide feedback or

comment, please email

fmartinez@tha.org

top related