SlideShare a Scribd company logo
1 of 3
Security Awareness
Sanoop S | Network & Information Systems Security Architect
Email Security
Spear Phishing: Don't Trust the Links Sent by Email Messages
We noticed many of the employees receiving spear phishing / Spam content emails. This kind
of attack happens all the time. But you don’t have to be a victim.
Spear phishing is an e-mail spoofing fraud attempt that targets a specific organization, seeking
unauthorized access to confidential data.
In many cases, spear-phishing emails use attachments made to appear as legitimatedocuments
because sharing via email is a common practice among largeenterprises and government
organizations.
Phishing messages that appear to be from a bank, shop or auction, giving a link to a fake
website and asking you to follow that link and confirm your account details. Many Phishing
emails we received recently Subject like: Upgrade Email Storage, Finance Statements, LPO. The
fraudsters then use your account details to buy stuff or transfer money out of the account. These
fake sites can be hard to spot, so no reputable organization will send a message requesting your
confidential information.
 Approach links in email messages with caution
Avoid clicking a link in an email message unless you are sure of the real target address, URL, or a
valid sender. Before you click a link, make sure to read the target address. If the email message
appears to come from your bank, but the target address is just a meaningless series of numbers, do
not click the link.
 Approach images in e-mail with caution
Just as a beacon within the oceans transmits a message or data back to a source, images within
email messages —also known as “web beacons” — can be used to secretly send a message back to
the sender. Spammers rely on information returned by these images to locate active e-mail
addresses. Images can also contain harmful codes and can be used to deliver a spammer's message
in spite of filters.
 Approach attachments in email messages with caution
Attachments might be viruses or spyware that download to your machine when you open the
attachment file. If you don't know whom the attachment is from or if you weren't expecting it, DO
NOT open the attachment.
 Don't trust the sender information in an e-mail message
Even if the email message appears to come from a particular sender that you know and trust, use
the same precautions that you would use with any other email message. Spoofing is email activity in
which the sender address and other parts of the email header are altered to appear as though the
email originated or was sent from a different source. This is a common practice of spammers and is
one of the hardest to combat as there may be legitimate reasons to spoof an address.
 Don't trust offers that seem too good to be true
If a deal or offer in an email message looks too good to be true, it probably is. The best defense is to
exercise your common sense when you read and respond to email messages.
 Don't enter personal or financial information into pop-up windows
One common phishing technique is to launch a fake pop-up window when someone clicks a link in a
phishing e-mail message. To make the pop-up window look more convincing, it might be displayed
over a window you trust. Even if the pop-up window looks official or claims to be secure, avoid
entering sensitive information, because there is no way to check the security certificate.
Keep your password secret:
Email Password |Computer Login Password | Application Login Password
Employees need to understand that keeping their passwords to themselves is critical to their
companies' security, Your Company expects you to use your password to stop others misusing
your computer account. If you share your password, you may be held responsible for what other
people do with it.
For safe and Secure IT Infrastructure we implement Account Lockout Policy If any one enter
wrong password more than 5 times your computer account will be locked.
Password Expiry: You will be prompted to change password every 90 Days.
Always change your default password set by IT.

More Related Content

What's hot

10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacksNamik Heydarov
 
3 pervasive phishing scams
3 pervasive phishing scams3 pervasive phishing scams
3 pervasive phishing scamsSafeSpaceOnline
 
Gone Phishing Infographic
Gone Phishing Infographic Gone Phishing Infographic
Gone Phishing Infographic The TNS Group
 
CISA Issues Emotet Warning!
CISA Issues Emotet Warning!CISA Issues Emotet Warning!
CISA Issues Emotet Warning!Nicole Payne
 
Phishing: Training Your Help Desk
Phishing: Training Your Help DeskPhishing: Training Your Help Desk
Phishing: Training Your Help DeskBeth Sallay
 
Importance Of Email Encryption In Organizations
Importance Of Email Encryption In Organizations  Importance Of Email Encryption In Organizations
Importance Of Email Encryption In Organizations ZixMailEncryption.com
 
The Difference between Pharming and Phishing
The Difference between Pharming and PhishingThe Difference between Pharming and Phishing
The Difference between Pharming and PhishingMason Bird
 
Security Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got MailSecurity Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got MailCatherine MacAllister
 
Preventions of Email Hacking
Preventions of Email HackingPreventions of Email Hacking
Preventions of Email HackingUsman Khan
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twinsNilantha Piyasiri
 
Detecting disposable email addresses
Detecting disposable email addressesDetecting disposable email addresses
Detecting disposable email addressesunRFP
 

What's hot (19)

Security provisions
Security provisions Security provisions
Security provisions
 
Online secuirty
Online secuirtyOnline secuirty
Online secuirty
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
Cel1
Cel1Cel1
Cel1
 
3 pervasive phishing scams
3 pervasive phishing scams3 pervasive phishing scams
3 pervasive phishing scams
 
Gone Phishing Infographic
Gone Phishing Infographic Gone Phishing Infographic
Gone Phishing Infographic
 
CISA Issues Emotet Warning!
CISA Issues Emotet Warning!CISA Issues Emotet Warning!
CISA Issues Emotet Warning!
 
ACC 210 WEEK 1 DQ2
ACC 210 WEEK 1 DQ2ACC 210 WEEK 1 DQ2
ACC 210 WEEK 1 DQ2
 
Phishing: Training Your Help Desk
Phishing: Training Your Help DeskPhishing: Training Your Help Desk
Phishing: Training Your Help Desk
 
Importance Of Email Encryption In Organizations
Importance Of Email Encryption In Organizations  Importance Of Email Encryption In Organizations
Importance Of Email Encryption In Organizations
 
Email hacking
Email hackingEmail hacking
Email hacking
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
How to Secure Your Outlook Account - 8 Easy Steps
How to Secure Your Outlook Account - 8 Easy StepsHow to Secure Your Outlook Account - 8 Easy Steps
How to Secure Your Outlook Account - 8 Easy Steps
 
The Difference between Pharming and Phishing
The Difference between Pharming and PhishingThe Difference between Pharming and Phishing
The Difference between Pharming and Phishing
 
Security Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got MailSecurity Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got Mail
 
Preventions of Email Hacking
Preventions of Email HackingPreventions of Email Hacking
Preventions of Email Hacking
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twins
 
Detecting disposable email addresses
Detecting disposable email addressesDetecting disposable email addresses
Detecting disposable email addresses
 
Smartphone Email Signatures
Smartphone Email SignaturesSmartphone Email Signatures
Smartphone Email Signatures
 

Viewers also liked

Sarah Scudder April 2015
Sarah Scudder April 2015Sarah Scudder April 2015
Sarah Scudder April 2015Sarah Scudder
 
PSMag_March2016_Linking Verve
PSMag_March2016_Linking VervePSMag_March2016_Linking Verve
PSMag_March2016_Linking VerveSarah Scudder
 
Opal survay 2015 final 16 may2015
Opal survay 2015 final 16 may2015Opal survay 2015 final 16 may2015
Opal survay 2015 final 16 may2015artsig
 
Group Travel | Destination Focus | North Cyprus
Group Travel | Destination Focus | North CyprusGroup Travel | Destination Focus | North Cyprus
Group Travel | Destination Focus | North CyprusRamadan Ozdemir
 
June SDG - Apex Best Practices
June SDG - Apex Best PracticesJune SDG - Apex Best Practices
June SDG - Apex Best PracticesJosep Vall-llovera
 
PROBLEMÁTICA DE LA CALIDAD DE AGUA EN ACUICULTURA AMAZÓNICA
PROBLEMÁTICA DE LA CALIDAD DE AGUA EN ACUICULTURA AMAZÓNICA PROBLEMÁTICA DE LA CALIDAD DE AGUA EN ACUICULTURA AMAZÓNICA
PROBLEMÁTICA DE LA CALIDAD DE AGUA EN ACUICULTURA AMAZÓNICA Jules Julien Arévalo Díaz
 
February'16 SDG - Spring'16 new features
February'16 SDG - Spring'16 new featuresFebruary'16 SDG - Spring'16 new features
February'16 SDG - Spring'16 new featuresJosep Vall-llovera
 
Marketing to Millennials: An Insider's Perspective
Marketing to Millennials: An Insider's PerspectiveMarketing to Millennials: An Insider's Perspective
Marketing to Millennials: An Insider's PerspectiveSarah Scudder
 
Which Mobile OS is the Most Secure; Apple, Android or Windows? [Updated 2016-...
Which Mobile OS is the Most Secure; Apple, Android or Windows? [Updated 2016-...Which Mobile OS is the Most Secure; Apple, Android or Windows? [Updated 2016-...
Which Mobile OS is the Most Secure; Apple, Android or Windows? [Updated 2016-...hlittle
 
1 . introduction to communication system
1 . introduction to communication system1 . introduction to communication system
1 . introduction to communication systemabhijitjnec
 
Power poin yasmin
Power poin yasminPower poin yasmin
Power poin yasminyasmin rua
 
Clase 1 biob70
Clase 1 biob70Clase 1 biob70
Clase 1 biob70nicolasooo
 
Procesos Afectivos
Procesos AfectivosProcesos Afectivos
Procesos Afectivosangeestrada
 
Porque papa noel no trae presentes para los ing electricistas
Porque papa noel no trae presentes para los ing electricistasPorque papa noel no trae presentes para los ing electricistas
Porque papa noel no trae presentes para los ing electricistasJose Luis
 
Sociedad de la Información y Comunicación.
Sociedad de la Información y Comunicación.Sociedad de la Información y Comunicación.
Sociedad de la Información y Comunicación.angeestrada
 
Diamujer
DiamujerDiamujer
Diamujergiovan2
 

Viewers also liked (20)

Sarah Scudder April 2015
Sarah Scudder April 2015Sarah Scudder April 2015
Sarah Scudder April 2015
 
PSMag_March2016_Linking Verve
PSMag_March2016_Linking VervePSMag_March2016_Linking Verve
PSMag_March2016_Linking Verve
 
Opal survay 2015 final 16 may2015
Opal survay 2015 final 16 may2015Opal survay 2015 final 16 may2015
Opal survay 2015 final 16 may2015
 
james
jamesjames
james
 
Group Travel | Destination Focus | North Cyprus
Group Travel | Destination Focus | North CyprusGroup Travel | Destination Focus | North Cyprus
Group Travel | Destination Focus | North Cyprus
 
June SDG - Apex Best Practices
June SDG - Apex Best PracticesJune SDG - Apex Best Practices
June SDG - Apex Best Practices
 
PROBLEMÁTICA DE LA CALIDAD DE AGUA EN ACUICULTURA AMAZÓNICA
PROBLEMÁTICA DE LA CALIDAD DE AGUA EN ACUICULTURA AMAZÓNICA PROBLEMÁTICA DE LA CALIDAD DE AGUA EN ACUICULTURA AMAZÓNICA
PROBLEMÁTICA DE LA CALIDAD DE AGUA EN ACUICULTURA AMAZÓNICA
 
September SDG - Lightning
September SDG - LightningSeptember SDG - Lightning
September SDG - Lightning
 
February'16 SDG - Spring'16 new features
February'16 SDG - Spring'16 new featuresFebruary'16 SDG - Spring'16 new features
February'16 SDG - Spring'16 new features
 
Marketing to Millennials: An Insider's Perspective
Marketing to Millennials: An Insider's PerspectiveMarketing to Millennials: An Insider's Perspective
Marketing to Millennials: An Insider's Perspective
 
Proceso Productivo del Paiche
Proceso Productivo del PaicheProceso Productivo del Paiche
Proceso Productivo del Paiche
 
Which Mobile OS is the Most Secure; Apple, Android or Windows? [Updated 2016-...
Which Mobile OS is the Most Secure; Apple, Android or Windows? [Updated 2016-...Which Mobile OS is the Most Secure; Apple, Android or Windows? [Updated 2016-...
Which Mobile OS is the Most Secure; Apple, Android or Windows? [Updated 2016-...
 
1 . introduction to communication system
1 . introduction to communication system1 . introduction to communication system
1 . introduction to communication system
 
Power poin yasmin
Power poin yasminPower poin yasmin
Power poin yasmin
 
Presentation1
Presentation1Presentation1
Presentation1
 
Clase 1 biob70
Clase 1 biob70Clase 1 biob70
Clase 1 biob70
 
Procesos Afectivos
Procesos AfectivosProcesos Afectivos
Procesos Afectivos
 
Porque papa noel no trae presentes para los ing electricistas
Porque papa noel no trae presentes para los ing electricistasPorque papa noel no trae presentes para los ing electricistas
Porque papa noel no trae presentes para los ing electricistas
 
Sociedad de la Información y Comunicación.
Sociedad de la Información y Comunicación.Sociedad de la Información y Comunicación.
Sociedad de la Información y Comunicación.
 
Diamujer
DiamujerDiamujer
Diamujer
 

Similar to Security awareness

IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUBilly Warero
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked inPayza
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitssuser64f8f8
 
Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? The TNS Group
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxamby3
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxvdgtkhdh
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Alexandru Turcu
 
How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?Ankush Sarkar
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigationNimishaRawat
 

Similar to Security awareness (20)

IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 
S_A_T.pptx
S_A_T.pptxS_A_T.pptx
S_A_T.pptx
 
Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You?
 
Email
EmailEmail
Email
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
Safe Email Practices
Safe Email PracticesSafe Email Practices
Safe Email Practices
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
 
Phishing & Cyber Attack Awareness
Phishing & Cyber Attack AwarenessPhishing & Cyber Attack Awareness
Phishing & Cyber Attack Awareness
 
How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?
 
Phishing
PhishingPhishing
Phishing
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigation
 
Keeping Your Email Secure
Keeping Your Email SecureKeeping Your Email Secure
Keeping Your Email Secure
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 

Recently uploaded

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Security awareness

  • 1. Security Awareness Sanoop S | Network & Information Systems Security Architect Email Security Spear Phishing: Don't Trust the Links Sent by Email Messages We noticed many of the employees receiving spear phishing / Spam content emails. This kind of attack happens all the time. But you don’t have to be a victim. Spear phishing is an e-mail spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data. In many cases, spear-phishing emails use attachments made to appear as legitimatedocuments because sharing via email is a common practice among largeenterprises and government organizations. Phishing messages that appear to be from a bank, shop or auction, giving a link to a fake website and asking you to follow that link and confirm your account details. Many Phishing emails we received recently Subject like: Upgrade Email Storage, Finance Statements, LPO. The fraudsters then use your account details to buy stuff or transfer money out of the account. These fake sites can be hard to spot, so no reputable organization will send a message requesting your confidential information.  Approach links in email messages with caution Avoid clicking a link in an email message unless you are sure of the real target address, URL, or a valid sender. Before you click a link, make sure to read the target address. If the email message appears to come from your bank, but the target address is just a meaningless series of numbers, do not click the link.  Approach images in e-mail with caution Just as a beacon within the oceans transmits a message or data back to a source, images within email messages —also known as “web beacons” — can be used to secretly send a message back to the sender. Spammers rely on information returned by these images to locate active e-mail
  • 2. addresses. Images can also contain harmful codes and can be used to deliver a spammer's message in spite of filters.  Approach attachments in email messages with caution Attachments might be viruses or spyware that download to your machine when you open the attachment file. If you don't know whom the attachment is from or if you weren't expecting it, DO NOT open the attachment.  Don't trust the sender information in an e-mail message Even if the email message appears to come from a particular sender that you know and trust, use the same precautions that you would use with any other email message. Spoofing is email activity in which the sender address and other parts of the email header are altered to appear as though the email originated or was sent from a different source. This is a common practice of spammers and is one of the hardest to combat as there may be legitimate reasons to spoof an address.  Don't trust offers that seem too good to be true If a deal or offer in an email message looks too good to be true, it probably is. The best defense is to exercise your common sense when you read and respond to email messages.  Don't enter personal or financial information into pop-up windows One common phishing technique is to launch a fake pop-up window when someone clicks a link in a phishing e-mail message. To make the pop-up window look more convincing, it might be displayed over a window you trust. Even if the pop-up window looks official or claims to be secure, avoid entering sensitive information, because there is no way to check the security certificate. Keep your password secret:
  • 3. Email Password |Computer Login Password | Application Login Password Employees need to understand that keeping their passwords to themselves is critical to their companies' security, Your Company expects you to use your password to stop others misusing your computer account. If you share your password, you may be held responsible for what other people do with it. For safe and Secure IT Infrastructure we implement Account Lockout Policy If any one enter wrong password more than 5 times your computer account will be locked. Password Expiry: You will be prompted to change password every 90 Days. Always change your default password set by IT.