1. The following is for your education, so please continue
through this exercise. You will learn about the risks of
phishing and some common traits to help identify phishing
attacks. Please read each slide carefully and completely.
The link you clicked on was part of
a phishing awareness campaign.
7. What can be done?
Improved
e-mail filtering
(technology)
Human sensor
network
(YOU!)
A NETWORK OF HUMAN SENSORS ARE MORE EFFECTIVE AT
DETECTING PHISHING ATTACKS THAN ALMOST ANY TECHNOLOGY
Source: 2015 Verizon Data Breach Investigations Report
15. Common Phishing Traits
1
2
3
4
5
6
1. Generic greeting
2. Invokes fear
3. Requires action
4. Threatening language
5. Grammar issues
6. Generic closing
16. DO NOT click on
unknown links
DO NOT reply to
suspicious requests
DO hover over links
verify its location
DO report the
suspected attack
What to do?
17. What to do?
DO Be suspicious of unsolicited attachments.
DO Confirm information through other channels of
communication. That is, contact the sender on a known line,
email, website, or other method.
DO NOT give information in the email.
DO NOT download any files.
DO NOT rely on the “from” and “reply to” email addresses,
which can be faked.
18. When in doubt, contact the
I.T. department or Your Supervisor
DO NOT CLICK, RESPOND OR DOWNLOAD!
Courtesy: Action Fraud and the National Fraud Intelligence Bureau