SlideShare a Scribd company logo
Policy Update: Communicable Diseases
Wed 3/18/2020 6:04 AM
Human Resources
To: John Smith
All,
Due to the coronavirus outbreak, [[company_name]] is actively taking safety precautions by
instituting a . This policy is part of our organizational
preparedness and we require all employees to read and acknowledge the policy before
[[current_date_1]].
If you have any questions or concerns regarding the policy, please contact [[company_name]]
Human Resources.
Regards,
Human Resources
EXPLOITING CONFUSED & STRESSED EMPLOYEES
WATCH FOR OVERLY GENERIC CONTENT AND GREETINGS
Cyber criminals will send a large batch of emails. Look for
examples like “Dear valued customer.”
NOTICE MISSPELLINGS, INCORRECT GRAMMAR, & ODD
PHRASING
This might be a deliberate attempt to try to bypass spam
filters.
EXAMINE THE ENTIRE FROM EMAIL ADDRESS
The first part of the email address may be legitimate but the
last part might be off by letter or may include a number in
the usual domain.
CHECK FOR SECURE WEBSITES
Any webpage where you enter personal information should
have a url with https://. The “s” stands for secure.
LOOK FOR URGENCY OR DEMANDING ACTIONS
“You’ve won! Click here to redeem prize,” or
“We have your browser history pay now or
we are telling your boss.”
DON’T CLICK ON ATTACHMENTS RIGHT AWAY
Attachments containing viruses might have an intriguing
message encouraging you to open them such as “Here is
the Schedule I promised.”
CAREFULLY CHECK ALL LINKS
Mouse over the link and see if the destination matches
where the email implies you will be taken.
Cyber criminals are exploiting headlines and global panic around the COVID-19 pandemic. Exercise
extreme caution with any emails containing a COVID-19-related subject line, attachment, or
hyperlinks. Be wary of social media pleas, texts, or calls related to COVID-19.
20 SECONDS TO BETTER EMAIL HYGIENE
BEWARE: COVID-19 PHISHING EMAILS
1 5
2 6
3 7
4
TOO GENERIC
URGENCY
LEGEND
FAKE E-MAIL ADDRESS
TOO GENERIC
BAD LINKS
URGENCY
FAKE E-MAIL ADDRESS
CHECK FOR FRAUDLENT LINKS
Make sure company details are
correct but also standard verbiage for
your organization.

More Related Content

What's hot

Symantec Threat Report 2017 - SSLRenewals
Symantec Threat Report 2017 - SSLRenewalsSymantec Threat Report 2017 - SSLRenewals
Symantec Threat Report 2017 - SSLRenewals
SSLRenewals
 
Apple Ransomware Slides
Apple Ransomware SlidesApple Ransomware Slides
Apple Ransomware Slides
AltinetLtd
 
How Phishing Works by Verified.org
How Phishing Works by Verified.orgHow Phishing Works by Verified.org
How Phishing Works by Verified.org
Cameron Craig
 
Liberteks Security Advisory002
Liberteks Security Advisory002Liberteks Security Advisory002
Liberteks Security Advisory002
Liberteks
 
Email threats 2017: Users encounter threats through email twice as often as o...
Email threats 2017: Users encounter threats through email twice as often as o...Email threats 2017: Users encounter threats through email twice as often as o...
Email threats 2017: Users encounter threats through email twice as often as o...
Symantec Security Response
 
Effective Anti-Phishing Strategies and Exercises - FISSEA 2017 Conference
Effective Anti-Phishing Strategies and Exercises - FISSEA 2017 ConferenceEffective Anti-Phishing Strategies and Exercises - FISSEA 2017 Conference
Effective Anti-Phishing Strategies and Exercises - FISSEA 2017 Conference
Paubox, Inc.
 
2016 Social Engineering Training
2016 Social Engineering Training2016 Social Engineering Training
2016 Social Engineering Training
Rob Valdez
 
The internet and safety
The internet and safetyThe internet and safety
The internet and safety
Patricia bb
 

What's hot (9)

Symantec Threat Report 2017 - SSLRenewals
Symantec Threat Report 2017 - SSLRenewalsSymantec Threat Report 2017 - SSLRenewals
Symantec Threat Report 2017 - SSLRenewals
 
Apple Ransomware Slides
Apple Ransomware SlidesApple Ransomware Slides
Apple Ransomware Slides
 
How Phishing Works by Verified.org
How Phishing Works by Verified.orgHow Phishing Works by Verified.org
How Phishing Works by Verified.org
 
Liberteks Security Advisory002
Liberteks Security Advisory002Liberteks Security Advisory002
Liberteks Security Advisory002
 
Email threats 2017: Users encounter threats through email twice as often as o...
Email threats 2017: Users encounter threats through email twice as often as o...Email threats 2017: Users encounter threats through email twice as often as o...
Email threats 2017: Users encounter threats through email twice as often as o...
 
Effective Anti-Phishing Strategies and Exercises - FISSEA 2017 Conference
Effective Anti-Phishing Strategies and Exercises - FISSEA 2017 ConferenceEffective Anti-Phishing Strategies and Exercises - FISSEA 2017 Conference
Effective Anti-Phishing Strategies and Exercises - FISSEA 2017 Conference
 
We Power Tech Panel
We Power Tech PanelWe Power Tech Panel
We Power Tech Panel
 
2016 Social Engineering Training
2016 Social Engineering Training2016 Social Engineering Training
2016 Social Engineering Training
 
The internet and safety
The internet and safetyThe internet and safety
The internet and safety
 

Similar to "Beware COVID-19 Phishing Emails - Exploiting Confused And Stressed Employees" Infographic

"Beware COVID-19 Phishing Emails - Spreading Fear And Panic Of Increased Loca...
"Beware COVID-19 Phishing Emails - Spreading Fear And Panic Of Increased Loca..."Beware COVID-19 Phishing Emails - Spreading Fear And Panic Of Increased Loca...
"Beware COVID-19 Phishing Emails - Spreading Fear And Panic Of Increased Loca...
David McHale
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
Billy Warero
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
Tanvir Amin
 
Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You?
The TNS Group
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigation
NimishaRawat
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
AbdullaFatiya3
 
Security awareness
Security awarenessSecurity awareness
Security awareness
Sanoop Nair
 
Cb Threat Report
Cb Threat ReportCb Threat Report
Cb Threat Report
Andrew Cibotti
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
Gary Wagnon
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
ssuser64f8f8
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
NetLockSmith
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
RapidSSLOnline.com
 
Protecting Your Business, Cybersecurity, and working remotely during COVID-19
Protecting Your Business, Cybersecurity, and working remotely during COVID-19Protecting Your Business, Cybersecurity, and working remotely during COVID-19
Protecting Your Business, Cybersecurity, and working remotely during COVID-19
ArielMcCurdy
 
What is Phishing - Kloudlearn
What is Phishing - KloudlearnWhat is Phishing - Kloudlearn
What is Phishing - Kloudlearn
KloudLearn
 
Internet Phishing
Internet PhishingInternet Phishing
Internet Phishing
DigeratiGroup
 
"Tips For Detecting A Phishing Email" Infographic
"Tips For Detecting A Phishing Email" Infographic"Tips For Detecting A Phishing Email" Infographic
"Tips For Detecting A Phishing Email" Infographic
David McHale
 
Phishing
PhishingPhishing
Phishing
Syeda Javeria
 
Data Security: A Guide To Whale Phishing
Data Security: A Guide To Whale PhishingData Security: A Guide To Whale Phishing
Data Security: A Guide To Whale Phishing
Phil Astell
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
Alexandru Turcu
 

Similar to "Beware COVID-19 Phishing Emails - Exploiting Confused And Stressed Employees" Infographic (20)

"Beware COVID-19 Phishing Emails - Spreading Fear And Panic Of Increased Loca...
"Beware COVID-19 Phishing Emails - Spreading Fear And Panic Of Increased Loca..."Beware COVID-19 Phishing Emails - Spreading Fear And Panic Of Increased Loca...
"Beware COVID-19 Phishing Emails - Spreading Fear And Panic Of Increased Loca...
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You?
 
internet security
internet securityinternet security
internet security
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigation
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Cb Threat Report
Cb Threat ReportCb Threat Report
Cb Threat Report
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
Protecting Your Business, Cybersecurity, and working remotely during COVID-19
Protecting Your Business, Cybersecurity, and working remotely during COVID-19Protecting Your Business, Cybersecurity, and working remotely during COVID-19
Protecting Your Business, Cybersecurity, and working remotely during COVID-19
 
What is Phishing - Kloudlearn
What is Phishing - KloudlearnWhat is Phishing - Kloudlearn
What is Phishing - Kloudlearn
 
Internet Phishing
Internet PhishingInternet Phishing
Internet Phishing
 
"Tips For Detecting A Phishing Email" Infographic
"Tips For Detecting A Phishing Email" Infographic"Tips For Detecting A Phishing Email" Infographic
"Tips For Detecting A Phishing Email" Infographic
 
Phishing
PhishingPhishing
Phishing
 
Data Security: A Guide To Whale Phishing
Data Security: A Guide To Whale PhishingData Security: A Guide To Whale Phishing
Data Security: A Guide To Whale Phishing
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
 

Recently uploaded

Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Avirahi City Dholera
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 

Recently uploaded (20)

Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 

"Beware COVID-19 Phishing Emails - Exploiting Confused And Stressed Employees" Infographic

  • 1. Policy Update: Communicable Diseases Wed 3/18/2020 6:04 AM Human Resources To: John Smith All, Due to the coronavirus outbreak, [[company_name]] is actively taking safety precautions by instituting a . This policy is part of our organizational preparedness and we require all employees to read and acknowledge the policy before [[current_date_1]]. If you have any questions or concerns regarding the policy, please contact [[company_name]] Human Resources. Regards, Human Resources EXPLOITING CONFUSED & STRESSED EMPLOYEES WATCH FOR OVERLY GENERIC CONTENT AND GREETINGS Cyber criminals will send a large batch of emails. Look for examples like “Dear valued customer.” NOTICE MISSPELLINGS, INCORRECT GRAMMAR, & ODD PHRASING This might be a deliberate attempt to try to bypass spam filters. EXAMINE THE ENTIRE FROM EMAIL ADDRESS The first part of the email address may be legitimate but the last part might be off by letter or may include a number in the usual domain. CHECK FOR SECURE WEBSITES Any webpage where you enter personal information should have a url with https://. The “s” stands for secure. LOOK FOR URGENCY OR DEMANDING ACTIONS “You’ve won! Click here to redeem prize,” or “We have your browser history pay now or we are telling your boss.” DON’T CLICK ON ATTACHMENTS RIGHT AWAY Attachments containing viruses might have an intriguing message encouraging you to open them such as “Here is the Schedule I promised.” CAREFULLY CHECK ALL LINKS Mouse over the link and see if the destination matches where the email implies you will be taken. Cyber criminals are exploiting headlines and global panic around the COVID-19 pandemic. Exercise extreme caution with any emails containing a COVID-19-related subject line, attachment, or hyperlinks. Be wary of social media pleas, texts, or calls related to COVID-19. 20 SECONDS TO BETTER EMAIL HYGIENE BEWARE: COVID-19 PHISHING EMAILS 1 5 2 6 3 7 4 TOO GENERIC URGENCY LEGEND FAKE E-MAIL ADDRESS TOO GENERIC BAD LINKS URGENCY FAKE E-MAIL ADDRESS CHECK FOR FRAUDLENT LINKS Make sure company details are correct but also standard verbiage for your organization.