Threats of phishing and how to secure yourself

  • 794 views
Uploaded on

Valuable tips to protect your online data and confidential accounts from thefts and phishing

Valuable tips to protect your online data and confidential accounts from thefts and phishing

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
794
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
6
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. THREATS OF PHISHINGEMAILS AND HOW TOSECURE YOURSELF?By David Rowe,Techability.com.au
  • 2. What are Phishing Emails?• Phishing Emails are generally used to acquire personal information about you, such as passwords, usernames, or even credit card details• The reason these types of e-mails work is that they usually impersonate a trustworthy company or institution,• And by sending a huge number of these email messages, only a small percentage of successes are required to make the scam a success• Consequently, the average person will be inclined to believe that there will be no danger in giving away their personal information
  • 3. Less Malicious Phishing Emails• Some phishing e-mails don’t cause malicious damage,• Instead just send of some spam from your account• But they can have serious consequences: they can get your accounts suspended,• They can get you disconnected from your service provider• And they can even drain your credit card account or give you a bad credit rating.
  • 4. How to make yourself ‘Phishing’ proof?• It is important that users educate themselves and develop better habits when browsing on-line• If you receive an e-mail asking you to confirm your password or to enter any sort of personal data, even if the address looks legit, it is advisable that you contact the company claiming to make the request in order to verify the authenticity• Don’t click any links in the email, nor should you reply to the message. This small precaution could keep you safe from scammers.
  • 5. Other types of ‘Phishing’ and safety tips!• Phishing attacks do not occur only through e-mails• Sometimes, hackers can impersonate official shopping websites, acquiring credit card information from buyers• This is why you should always think twice before making an online purchase• Double check the address bar at the top, and make sure you are really at the site you think you are• Many major sites also have secure and verified seals such as on the bottom of our home page• Click on these to confirm that the site is legitimate, and hasn’t been infected by malware or otherwise compromised by hackers
  • 6. Phished already???• If you have any suspicions, or think that you have become the victim of a phishing attack, you can try contacting the organisation which was impersonated in the first instance• And if necessary, the police to see what can be done in your case• There have been many cases of people being charged and facing court for having setup fake websites or deliberately sending fraudulent emails
  • 7. Conclusion• Following this simple advice isn’t difficult, and it could save you from a lot of troubles and headaches• Pay attention where you submit your personal information, and make your online experience as pleasant as possible• Happy browsing! About the author: This presentation is from David Rowe, the owner of Techability.com.au, that offers a range of IT services like computer and laptop repairs, virus removal and data recovery.