SlideShare a Scribd company logo
1 of 16
How to Recognize
Fake Email
Presented by:
SBS CyberSecurity
© SBS CyberSecurity, LLC
www.sbscyber.com
Consulting Network Security IT Audit Education 1
Why Do We Get Fake Emails?
• 97% of people cannot identify a sophisticated fake email
• People are the weakest security link in most business processes
• We can secure our networks, computers, systems, and internet
access to make it more difficult to compromise information
• People making decisions on emails that request action is a manual
process that cannot always be controlled
• It’s easier for hackers to use people
to gather information and build
schemes to get what they want
© SBS CyberSecurity, LLC
www.sbscyber.com
Consulting Network Security IT Audit Education 2
How to Recognize Fake Emails
• Legitimate companies do not send email requesting
sensitive information
• Don’t trust the name in the from field of an
email
• If it looks suspicious do not open the email
• Hover over links to see what address the link
takes you
• Open a new browser window and type the
website address directly into the browser
rather than clicking on the link
• Most companies us secure web addresses
identified by using https:// in the address
bar instead of just http://
© SBS CyberSecurity, LLC
www.sbscyber.com
Consulting Network Security IT Audit Education 3
How to Recognize Fake Emails
• Obvious grammar or spelling errors
• Strange message structures
• Generic greeting
• Urgent language
• Generic closing
• When in doubt, click the “Reply All” button
• This may reveal the true e-mail address
• Don’t click on email attachments
• Review the email signature
• Lack of details on contacting the company
© SBS CyberSecurity, LLC
www.sbscyber.com
Consulting Network Security IT Audit Education 4
Alarmist Email Social Engineering
Do this or else
Criminals try to create a sense of urgency so you’ll respond without
thinking
© SBS CyberSecurity, LLC
www.sbscyber.com
Consulting Network Security IT Audit Education 5
Alarmist Email Social Engineering
Do this or else
Criminals try to create a sense of urgency so you’ll respond without
thinking
© SBS CyberSecurity, LLC
www.sbscyber.com
Consulting Network Security IT Audit Education 6
Grammar/Spelling Issues
Often times phishing messages have typos, grammatical errors, or extra
characters
© SBS CyberSecurity, LLC
www.sbscyber.com
Consulting Network Security IT Audit Education 7
Examine Hyperlinks
• Hover over links
• Type into a browser to avoid subtle changes
© SBS CyberSecurity, LLC
www.sbscyber.com
Consulting Network Security IT Audit Education 8
What is Malware?
• Malware is an abbreviated term meaning “malicious
software.” This is software that is specifically designed
to gain access or damage a computer without the
knowledge of the owner.
• There are several types of malware;
• Ransomware is a profitable criminal business,
and its success lies in the way it develops the
urgency using scare tactics.
© SBS CyberSecurity, LLC
www.sbscyber.com
Consulting Network Security IT Audit Education 9
What is Ransomware?
• Ransomware is a type of malicious software designed to
block access to a computer system or mobile device until a
sum of money is paid.
• Ransomware is also referred to “Cyber Extortion”.
• Two types of Ransomware;
• Locker - ransomware denies access to
the computer or device.
• Crypto - ransomware prevents access
to files or data.
Ransomware is often spread
through phishing emails that
contain malicious attachments or when a user unknowingly
visits an infected website and then malware is downloaded
and installed without the user’s knowledge.
© SBS CyberSecurity, LLC
www.sbscyber.com
Consulting Network Security IT Audit Education 10
Recovery Options from
Ransomware
• Restore the system or files and data from the
last backup.
• Data lost since last backup
• Pay the ransom to receive an encryption key
to unlock the files and data.
• Encourages more attacks
© SBS CyberSecurity, LLC
www.sbscyber.com
Consulting Network Security IT Audit Education 11
Phishing is Out of Control
Phishing email is like the Wild West with no one holding
crime accountable and we have to defend ourselves.
© SBS CyberSecurity, LLC
www.sbscyber.com
Consulting Network Security IT Audit Education 12
What to Do With These Emails
• DO NOT CLICK ON UNKNOWN LINKS OR
ATTACHMENTS
• If you are not sure about the email, caution on the side
of not opening the email
• Contact the ISO or a member of the IT Department to
let them know about the email and they will let you
know what to do with it
© SBS CyberSecurity, LLC
www.sbscyber.com
Consulting Network Security IT Audit Education 13
Response to Clicking on a
Fake Email
• If you think you may have clicked on an email
you shouldn’t have
• Call the IT department to let them know
before it is too late to fix
• Do not click on other emails until the IT
Department has cleared you to do so
• Create an environment that encourages
acknowledging the mistake so the
IT Department can address the issue
quickly
© SBS CyberSecurity, LLC
www.sbscyber.com
Consulting Network Security IT Audit Education 14
Fake Email Risk
IT only takes one compromise to get information
© SBS CyberSecurity, LLC
www.sbscyber.com
Consulting Network Security IT Audit Education 15
ONE PERSON–ONE MOMENT–ONE OPPORTUNITY
TODAY, ARE YOU GOING TO BE THAT ONE?
Presented by SBS CyberSecurity
(605) 923-8722
700 S Washington Ave Ste 200,
Madison, SD 57042
www.sbscyber.com
sales@sbscyber.com
Let’s Connect!
© SBS CyberSecurity, LLC
www.sbscyber.com
Consulting Network Security IT Audit Education 16

More Related Content

Similar to How to Recognize a Fake Email.pptx

Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxQuiMo3
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxStephen Jesukanth Martin
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service DeskNorthCoastHDI
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafeCheapSSLsecurity
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxAbdullaFatiya3
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcareNicholas Davis
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesHuman Resources & Payroll
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & PrivacyAlexine Marier
 
Malware Security
Malware SecurityMalware Security
Malware SecurityMike Ellis
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitssuser64f8f8
 
Cyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicCyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicKate Barney
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerSteve Poole
 

Similar to How to Recognize a Fake Email.pptx (20)

Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptx
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service Desk
 
Eset cybersecurity awareness (laxman giri)
Eset cybersecurity awareness (laxman giri)Eset cybersecurity awareness (laxman giri)
Eset cybersecurity awareness (laxman giri)
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to doNEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 
Malware Security
Malware SecurityMalware Security
Malware Security
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
Cyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicCyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemic
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 

Recently uploaded

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

How to Recognize a Fake Email.pptx

  • 1. How to Recognize Fake Email Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education 1
  • 2. Why Do We Get Fake Emails? • 97% of people cannot identify a sophisticated fake email • People are the weakest security link in most business processes • We can secure our networks, computers, systems, and internet access to make it more difficult to compromise information • People making decisions on emails that request action is a manual process that cannot always be controlled • It’s easier for hackers to use people to gather information and build schemes to get what they want © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education 2
  • 3. How to Recognize Fake Emails • Legitimate companies do not send email requesting sensitive information • Don’t trust the name in the from field of an email • If it looks suspicious do not open the email • Hover over links to see what address the link takes you • Open a new browser window and type the website address directly into the browser rather than clicking on the link • Most companies us secure web addresses identified by using https:// in the address bar instead of just http:// © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education 3
  • 4. How to Recognize Fake Emails • Obvious grammar or spelling errors • Strange message structures • Generic greeting • Urgent language • Generic closing • When in doubt, click the “Reply All” button • This may reveal the true e-mail address • Don’t click on email attachments • Review the email signature • Lack of details on contacting the company © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education 4
  • 5. Alarmist Email Social Engineering Do this or else Criminals try to create a sense of urgency so you’ll respond without thinking © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education 5
  • 6. Alarmist Email Social Engineering Do this or else Criminals try to create a sense of urgency so you’ll respond without thinking © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education 6
  • 7. Grammar/Spelling Issues Often times phishing messages have typos, grammatical errors, or extra characters © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education 7
  • 8. Examine Hyperlinks • Hover over links • Type into a browser to avoid subtle changes © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education 8
  • 9. What is Malware? • Malware is an abbreviated term meaning “malicious software.” This is software that is specifically designed to gain access or damage a computer without the knowledge of the owner. • There are several types of malware; • Ransomware is a profitable criminal business, and its success lies in the way it develops the urgency using scare tactics. © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education 9
  • 10. What is Ransomware? • Ransomware is a type of malicious software designed to block access to a computer system or mobile device until a sum of money is paid. • Ransomware is also referred to “Cyber Extortion”. • Two types of Ransomware; • Locker - ransomware denies access to the computer or device. • Crypto - ransomware prevents access to files or data. Ransomware is often spread through phishing emails that contain malicious attachments or when a user unknowingly visits an infected website and then malware is downloaded and installed without the user’s knowledge. © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education 10
  • 11. Recovery Options from Ransomware • Restore the system or files and data from the last backup. • Data lost since last backup • Pay the ransom to receive an encryption key to unlock the files and data. • Encourages more attacks © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education 11
  • 12. Phishing is Out of Control Phishing email is like the Wild West with no one holding crime accountable and we have to defend ourselves. © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education 12
  • 13. What to Do With These Emails • DO NOT CLICK ON UNKNOWN LINKS OR ATTACHMENTS • If you are not sure about the email, caution on the side of not opening the email • Contact the ISO or a member of the IT Department to let them know about the email and they will let you know what to do with it © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education 13
  • 14. Response to Clicking on a Fake Email • If you think you may have clicked on an email you shouldn’t have • Call the IT department to let them know before it is too late to fix • Do not click on other emails until the IT Department has cleared you to do so • Create an environment that encourages acknowledging the mistake so the IT Department can address the issue quickly © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education 14
  • 15. Fake Email Risk IT only takes one compromise to get information © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education 15 ONE PERSON–ONE MOMENT–ONE OPPORTUNITY TODAY, ARE YOU GOING TO BE THAT ONE?
  • 16. Presented by SBS CyberSecurity (605) 923-8722 700 S Washington Ave Ste 200, Madison, SD 57042 www.sbscyber.com sales@sbscyber.com Let’s Connect! © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education 16