SlideShare a Scribd company logo
1 of 9
What is phishing?
A type of fraud in which a hacker attempts to gather
personal information by impersonating a legitimate
source or by sending users to a malicious website.
Hackers try to obtain information that could help them
pose as someone else, usually to steal money or
intellectual property. They also try to infiltrate an
organization’s network, stealing credentials, disrupting
critical processes or encrypting (locking) data and
making it inaccessible until ransom demands are met.
Phishers can create fake emails that
appear from someone you trust, such
as a bank, a social media website or
even from a Ruhrpumpen account.
With the uptick in ransomware infections that are often
instigated through phishing emails, it’s crucial to take
proactive measures to help protect yourself and the
organization’s security.
10 things to watch
1
Don’t trust the display name of who the
email is from
Be sure to look at the email address to confirm the true
sender
6
Beware of urgency
The message may make you think there is an
emergency, they make you act without thinking, or urge
you to make an action like clicking on a link or opening
the attachment
2
Look but don’t click
Hover your mouse over parts of the email without
clicking, if the alternative text looks strange don’t click it
7
Check the email signature
Legitimate senders will include a full signature block at
the bottom
3
Check for spelling errors
A normal sender would care about spelling and
grammar, don’t you think?
8
Be careful with attachments
Attackers will trick you into opening or downloading the
attachment
4
Consider the salutation
Is it vague or really general? Is it addressed to “Dear
Sir/Madam” or “Valued customer”?
9
Don’t believe everything you see
It’s better to be safe than sorry, if you see something off
its OK to doubt (that Nigerian prince in trouble can wait)
5
Is the email asking for personal
information?
Legitimate companies do not ask for personal
information in the email
10
When in doubt, ask
No matter the time of day or the concern, report the
email to the IT department
The anatomy of a
phishing email
1. Email sent from
suspicious email address
2. Unsolicited attachment
3. Generic greetings
4. Text prompts you to
open attachment
5. Don’t rely on images, brand logos
and trademarks can be easily replicated
6. Toll free numbers that do
not match known numbers
The anatomy of a
phishing email
1. Email sent from a “good”
address, but unsolicited
2. Grammatical errors
3. Why do I have to go to a
website to see the message?
4. Checking the link. The alt text
tells us it leads to a strange link.
5. No signature, footer is a bit
off because it mentions
LinkedIn even when the
message was sent by “Donald”
The anatomy of a
phishing email
1. Email sent from a free gmail account,
weird name for an email address
2. Subject is about pumps, but not
exactly what someone would write as
Subject for an email
3. PDF attachment
4. No message contents
The anatomy of a
phishing email
1. Email sent from a legitimate
address inside Ruhrpumpen
2. Checking the other accounts,
we found someone using a
“bogus domain” (fake domain)
Hacker was messing with
a payment, tricking the
customer to make a
deposit to another bank.
How to spot a dangerous
email attachment?
Email attachments can be harmful, any type of file can be attached to an email.
85% of malicious emails have
these types of files attached: 7 Z
Other potentially dangerous attachments include:
Is the sender someone you recognize and trust?
Microsoft Office Packaging of files
File extensions could be
changed to .doc(1),
making you think it is a
Word Document but
instead it is a malware.
IMPORTANT
What to do?
 Never give out personal or sensitive information based on an email
request.
 Don’t trust links or attachments in unsolicited emails.
 Hover over links in email messages to verify its actual destination, even if it
comes from a trusted source.
 Instead of clicking on the link, search on your web browser (Google it!).
 Be suspicious about phone numbers in emails. Use the phone number
found on a trusted directory instead.
Report these kind of emails
to the IT department

More Related Content

What's hot

3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
Ana Meskovska
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
DallasHaselhorst
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
Atlantic Training, LLC.
 

What's hot (20)

Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Anti phishing presentation
Anti phishing presentationAnti phishing presentation
Anti phishing presentation
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Phishing
PhishingPhishing
Phishing
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
 

Similar to RP Phishing Awareness

phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
amby3
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
Payza
 

Similar to RP Phishing Awareness (20)

Security awareness
Security awarenessSecurity awareness
Security awareness
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
5 Tell-Tale Signs of Phishing
5 Tell-Tale Signs of Phishing5 Tell-Tale Signs of Phishing
5 Tell-Tale Signs of Phishing
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
Common Email Security Mistakes
Common Email Security MistakesCommon Email Security Mistakes
Common Email Security Mistakes
 
How to Detect Email Fraud
How to Detect Email FraudHow to Detect Email Fraud
How to Detect Email Fraud
 
Gone Phishing Infographic
Gone Phishing Infographic Gone Phishing Infographic
Gone Phishing Infographic
 
How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?
 
Phishing
PhishingPhishing
Phishing
 
Phishing email PDF Flyer
Phishing email PDF FlyerPhishing email PDF Flyer
Phishing email PDF Flyer
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You?
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...
 
S_A_T.pptx
S_A_T.pptxS_A_T.pptx
S_A_T.pptx
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

RP Phishing Awareness

  • 1. What is phishing? A type of fraud in which a hacker attempts to gather personal information by impersonating a legitimate source or by sending users to a malicious website. Hackers try to obtain information that could help them pose as someone else, usually to steal money or intellectual property. They also try to infiltrate an organization’s network, stealing credentials, disrupting critical processes or encrypting (locking) data and making it inaccessible until ransom demands are met.
  • 2. Phishers can create fake emails that appear from someone you trust, such as a bank, a social media website or even from a Ruhrpumpen account. With the uptick in ransomware infections that are often instigated through phishing emails, it’s crucial to take proactive measures to help protect yourself and the organization’s security.
  • 3. 10 things to watch 1 Don’t trust the display name of who the email is from Be sure to look at the email address to confirm the true sender 6 Beware of urgency The message may make you think there is an emergency, they make you act without thinking, or urge you to make an action like clicking on a link or opening the attachment 2 Look but don’t click Hover your mouse over parts of the email without clicking, if the alternative text looks strange don’t click it 7 Check the email signature Legitimate senders will include a full signature block at the bottom 3 Check for spelling errors A normal sender would care about spelling and grammar, don’t you think? 8 Be careful with attachments Attackers will trick you into opening or downloading the attachment 4 Consider the salutation Is it vague or really general? Is it addressed to “Dear Sir/Madam” or “Valued customer”? 9 Don’t believe everything you see It’s better to be safe than sorry, if you see something off its OK to doubt (that Nigerian prince in trouble can wait) 5 Is the email asking for personal information? Legitimate companies do not ask for personal information in the email 10 When in doubt, ask No matter the time of day or the concern, report the email to the IT department
  • 4. The anatomy of a phishing email 1. Email sent from suspicious email address 2. Unsolicited attachment 3. Generic greetings 4. Text prompts you to open attachment 5. Don’t rely on images, brand logos and trademarks can be easily replicated 6. Toll free numbers that do not match known numbers
  • 5. The anatomy of a phishing email 1. Email sent from a “good” address, but unsolicited 2. Grammatical errors 3. Why do I have to go to a website to see the message? 4. Checking the link. The alt text tells us it leads to a strange link. 5. No signature, footer is a bit off because it mentions LinkedIn even when the message was sent by “Donald”
  • 6. The anatomy of a phishing email 1. Email sent from a free gmail account, weird name for an email address 2. Subject is about pumps, but not exactly what someone would write as Subject for an email 3. PDF attachment 4. No message contents
  • 7. The anatomy of a phishing email 1. Email sent from a legitimate address inside Ruhrpumpen 2. Checking the other accounts, we found someone using a “bogus domain” (fake domain) Hacker was messing with a payment, tricking the customer to make a deposit to another bank.
  • 8. How to spot a dangerous email attachment? Email attachments can be harmful, any type of file can be attached to an email. 85% of malicious emails have these types of files attached: 7 Z Other potentially dangerous attachments include: Is the sender someone you recognize and trust? Microsoft Office Packaging of files File extensions could be changed to .doc(1), making you think it is a Word Document but instead it is a malware. IMPORTANT
  • 9. What to do?  Never give out personal or sensitive information based on an email request.  Don’t trust links or attachments in unsolicited emails.  Hover over links in email messages to verify its actual destination, even if it comes from a trusted source.  Instead of clicking on the link, search on your web browser (Google it!).  Be suspicious about phone numbers in emails. Use the phone number found on a trusted directory instead. Report these kind of emails to the IT department