SlideShare a Scribd company logo
1 of 7
Download to read offline
Enterprise Center (NEC)
 Assurance Officer and your servicing Network                        http://www.us-cert.gov/reading_room/emailscams_0905.pdf
Report Phishing Attacks to Your Local Information
                                                                      Recognizing & Avoiding Email Scams:
SUSPICIOUS ACTIVITY REPORTING
                                                                       servicing Network Enterprise Center (NEC).
                                                                       your local Information Assurance Officer and
                                                                    •	 If you are using a government computer, contact
                                                                      just experienced.  
                                                                      and inform them about the phishing attack you
                                                                   •	 Click the “contact us” link found on most websites
                                                                        account information and password.
                                                                     •	 Follow the website’s instructions to change your
                                                                       or “change password” link.
                                                                    •	 Sign into your account and click the “user profile”
                                                                              address bar.
                                                                           •	 Type the website name in your browser’s	
                                                                             real website:
                                                                          •	 Change your password immediately at the	
                                                                        Anti Phishing Quick Reaction Drill
                                                                                  Phished!
                                                                             I think I’ve been
                                                                                   Help!
        What is Phishing?                                              Why Phishing Works
Phishing is an attempt by an individual or group to
solicit personal information from unsuspecting users
by employing social engineering techniques (i.e.,
                                                                   •	 We are easily enticed —we trust known
manipulating people into performing actions or divulging              brands/logos
confidential information).   Phishing emails are crafted to
appear as if they were sent from a legitimate organization         •	 Lack of user education and awareness
or known individual.   These emails often attempt to attract
users to click on a link that will take the user to a fraudulent   •	 Lack of Information Assurance knowledge
website that appears legitimate.   The user then may be               and warning indicators
asked to provide personal information, such as account
usernames and passwords that can further expose them,
their network, and their unit to future compromises.               •	 Visually deceptive text
In order to fully understand phishing and how it can impact        •	 Image masking
you and your unit, you should be aware that there are
different types of phishing:                                       •	 Image mimicking Windows
Phishing is usually an e-mail sent to a large group of
people that attempts to scam the recipients. The people
the message is sent to often do not have anything in
common.
Spear phishing is a message sent to a smaller, more
select group of targeted people or to a single individual.
Whaling or whale phishing is a highly personalized
message sent to senior executives, high-level officials ,or
their personal executive staff members.
Enterprise Center (NEC)
 Assurance Officer and your servicing Network                        http://www.us-cert.gov/reading_room/emailscams_0905.pdf
Report Phishing Attacks to Your Local Information
                                                                      Recognizing & Avoiding Email Scams:
SUSPICIOUS ACTIVITY REPORTING


                                                                       servicing Network Enterprise Center (NEC).
                                                                       your local Information Assurance Officer and
                                                                    •	 If you are using a government computer, contact

                                                                      just experienced.  
                                                                      and inform them about the phishing attack you
                                                                   •	 Click the “contact us” link found on most websites

                                                                        account information and password.
                                                                     •	 Follow the website’s instructions to change your

                                                                       or “change password” link.
                                                                    •	 Sign into your account and click the “user profile”

                                                                              address bar.
                                                                           •	 Type the website name in your browser’s	

                                                                             real website:
                                                                          •	 Change your password immediately at the	

                                                                        Anti Phishing Quick Reaction Drill

                                                                                  Phished!
                                                                             I think I’ve been
                                                                                   Help!




        What is Phishing?                                              Why Phishing Works
Phishing is an attempt by an individual or group to
solicit personal information from unsuspecting users
by employing social engineering techniques (i.e.,
                                                                   •	 We are easily enticed —we trust known
manipulating people into performing actions or divulging              brands/logos
confidential information).   Phishing emails are crafted to
appear as if they were sent from a legitimate organization         •	 Lack of user education and awareness
or known individual.   These emails often attempt to attract
users to click on a link that will take the user to a fraudulent   •	 Lack of Information Assurance knowledge
website that appears legitimate.   The user then may be               and warning indicators
asked to provide personal information, such as account
usernames and passwords that can further expose them,
their network, and their unit to future compromises.               •	 Visually deceptive text

In order to fully understand phishing and how it can impact        •	 Image masking
you and your unit, you should be aware that there are
different types of phishing:                                       •	 Image mimicking Windows
Phishing is usually an e-mail sent to a large group of
people that attempts to scam the recipients. The people
the message is sent to often do not have anything in
common.

Spear phishing is a message sent to a smaller, more
select group of targeted people or to a single individual.

Whaling or whale phishing is a highly personalized
message sent to senior executives, high-level officials ,or
their personal executive staff members.
Enterprise Center (NEC)
 Assurance Officer and your servicing Network                        http://www.us-cert.gov/reading_room/emailscams_0905.pdf
Report Phishing Attacks to Your Local Information
                                                                      Recognizing & Avoiding Email Scams:
SUSPICIOUS ACTIVITY REPORTING


                                                                       servicing Network Enterprise Center (NEC).
                                                                       your local Information Assurance Officer and
                                                                    •	 If you are using a government computer, contact

                                                                      just experienced.  
                                                                      and inform them about the phishing attack you
                                                                   •	 Click the “contact us” link found on most websites

                                                                        account information and password.
                                                                     •	 Follow the website’s instructions to change your

                                                                       or “change password” link.
                                                                    •	 Sign into your account and click the “user profile”

                                                                              address bar.
                                                                           •	 Type the website name in your browser’s	

                                                                             real website:
                                                                          •	 Change your password immediately at the	

                                                                        Anti Phishing Quick Reaction Drill

                                                                                  Phished!
                                                                             I think I’ve been
                                                                                   Help!




        What is Phishing?                                              Why Phishing Works
Phishing is an attempt by an individual or group to
solicit personal information from unsuspecting users
by employing social engineering techniques (i.e.,
                                                                   •	 We are easily enticed —we trust known
manipulating people into performing actions or divulging              brands/logos
confidential information).   Phishing emails are crafted to
appear as if they were sent from a legitimate organization         •	 Lack of user education and awareness
or known individual.   These emails often attempt to attract
users to click on a link that will take the user to a fraudulent   •	 Lack of Information Assurance knowledge
website that appears legitimate.   The user then may be               and warning indicators
asked to provide personal information, such as account
usernames and passwords that can further expose them,
their network, and their unit to future compromises.               •	 Visually deceptive text

In order to fully understand phishing and how it can impact        •	 Image masking
you and your unit, you should be aware that there are
different types of phishing:                                       •	 Image mimicking Windows
Phishing is usually an e-mail sent to a large group of
people that attempts to scam the recipients. The people
the message is sent to often do not have anything in
common.

Spear phishing is a message sent to a smaller, more
select group of targeted people or to a single individual.

Whaling or whale phishing is a highly personalized
message sent to senior executives, high-level officials ,or
their personal executive staff members.
How Phishing Works




           User Awareness                                    Protect Yourself and
•	 Most phishing attempts are for identity theft, but         Your Organization
   phishing is also being used to gain access to
   online banking, federal, and DoD information
                                                        DO
•	 Phishing Attacks can be geared to collect
   personal information such as: SSN, mother’s          •	 Watch out for phishing
   maiden name, date of birth, passwords, credit
   card numbers, etc.                                   •	 Delete suspicious emails

•	 Phishing emails not only attempt to trick you        •	 Contact your Information Assurance Officer
   into giving out sensitive information, but also         or your servicing Network Enterprise Center
   can include malicious software                          (NEC) if you have questions about emails

•	 Malicious software can be viruses and other          •	 Report any potential incidents
   computer code designed to allow a hacker to
   use your computer for illegal Internet activity,       DO NOT
   or to access your unit’s network to gather DoD        
   information                                           •	 Open suspicious emails

•	 Malicious code may capture your keystrokes or        •	 Click on suspicious links in emails or pop-
   capture your personal and work files and send           up windows
   them to people without your knowledge
                                                        •	 Call telephone numbers provided in
                                                           suspicious emails

                                                        •	 Disclose any information
How Phishing Works




           User Awareness                                    Protect Yourself and
•	 Most phishing attempts are for identity theft, but         Your Organization
   phishing is also being used to gain access to
   online banking, federal, and DoD information
                                                        DO
•	 Phishing Attacks can be geared to collect
   personal information such as: SSN, mother’s          •	 Watch out for phishing
   maiden name, date of birth, passwords, credit
   card numbers, etc.                                   •	 Delete suspicious emails

•	 Phishing emails not only attempt to trick you        •	 Contact your Information Assurance Officer
   into giving out sensitive information, but also         or your servicing Network Enterprise Center
   can include malicious software                          (NEC) if you have questions about emails

•	 Malicious software can be viruses and other          •	 Report any potential incidents
   computer code designed to allow a hacker to
   use your computer for illegal Internet activity,       DO NOT
   or to access your unit’s network to gather DoD        
   information                                           •	 Open suspicious emails

•	 Malicious code may capture your keystrokes or        •	 Click on suspicious links in emails or pop-
   capture your personal and work files and send           up windows
   them to people without your knowledge
                                                        •	 Call telephone numbers provided in
                                                           suspicious emails

                                                        •	 Disclose any information
How Phishing Works




           User Awareness                                    Protect Yourself and
•	 Most phishing attempts are for identity theft, but         Your Organization
   phishing is also being used to gain access to
   online banking, federal, and DoD information
                                                        DO
•	 Phishing Attacks can be geared to collect
   personal information such as: SSN, mother’s          •	 Watch out for phishing
   maiden name, date of birth, passwords, credit
   card numbers, etc.                                   •	 Delete suspicious emails

•	 Phishing emails not only attempt to trick you        •	 Contact your Information Assurance Officer
   into giving out sensitive information, but also         or your servicing Network Enterprise Center
   can include malicious software                          (NEC) if you have questions about emails

•	 Malicious software can be viruses and other          •	 Report any potential incidents
   computer code designed to allow a hacker to
   use your computer for illegal Internet activity,       DO NOT
   or to access your unit’s network to gather DoD        
   information                                           •	 Open suspicious emails

•	 Malicious code may capture your keystrokes or        •	 Click on suspicious links in emails or pop-
   capture your personal and work files and send           up windows
   them to people without your knowledge
                                                        •	 Call telephone numbers provided in
                                                           suspicious emails

                                                        •	 Disclose any information
Enterprise Center (NEC)
 Assurance Officer and your servicing Network                        http://www.us-cert.gov/reading_room/emailscams_0905.pdf
Report Phishing Attacks to Your Local Information
                                                                      Recognizing & Avoiding Email Scams:
SUSPICIOUS ACTIVITY REPORTING
                                                                       servicing Network Enterprise Center (NEC).
                                                                       your local Information Assurance Officer and
                                                                    •	 If you are using a government computer, contact
                                                                      just experienced.  
                                                                      and inform them about the phishing attack you
                                                                   •	 Click the “contact us” link found on most websites
                                                                        account information and password.
                                                                     •	 Follow the website’s instructions to change your
                                                                       or “change password” link.
                                                                    •	 Sign into your account and click the “user profile”
                                                                              address bar.
                                                                           •	 Type the website name in your browser’s	
                                                                             real website:
                                                                          •	 Change your password immediately at the	
                                                                        Anti Phishing Quick Reaction Drill
                                                                                  Phished!
                                                                             I think I’ve been
                                                                                   Help!
        What is Phishing?                                              Why Phishing Works
Phishing is an attempt by an individual or group to
solicit personal information from unsuspecting users
by employing social engineering techniques (i.e.,
                                                                   •	 We are easily enticed —we trust known
manipulating people into performing actions or divulging              brands/logos
confidential information).   Phishing emails are crafted to
appear as if they were sent from a legitimate organization         •	 Lack of user education and awareness
or known individual.   These emails often attempt to attract
users to click on a link that will take the user to a fraudulent   •	 Lack of Information Assurance knowledge
website that appears legitimate.   The user then may be               and warning indicators
asked to provide personal information, such as account
usernames and passwords that can further expose them,
their network, and their unit to future compromises.               •	 Visually deceptive text
In order to fully understand phishing and how it can impact        •	 Image masking
you and your unit, you should be aware that there are
different types of phishing:                                       •	 Image mimicking Windows
Phishing is usually an e-mail sent to a large group of
people that attempts to scam the recipients. The people
the message is sent to often do not have anything in
common.
Spear phishing is a message sent to a smaller, more
select group of targeted people or to a single individual.
Whaling or whale phishing is a highly personalized
message sent to senior executives, high-level officials ,or
their personal executive staff members.

More Related Content

Viewers also liked

November 2012 Thunderbolt Blast
November 2012 Thunderbolt BlastNovember 2012 Thunderbolt Blast
November 2012 Thunderbolt BlastNoel Waterman
 
F.E.S-Board® Brochure
F.E.S-Board® BrochureF.E.S-Board® Brochure
F.E.S-Board® BrochureMike Berry
 
Armor Newsletter 1st QRT 2013
Armor Newsletter 1st QRT 2013 Armor Newsletter 1st QRT 2013
Armor Newsletter 1st QRT 2013 Noel Waterman
 
Jan/Feb 2013 Devil's Corner Newsletter
Jan/Feb 2013 Devil's Corner NewsletterJan/Feb 2013 Devil's Corner Newsletter
Jan/Feb 2013 Devil's Corner NewsletterNoel Waterman
 
Web development(kewal)
Web development(kewal)Web development(kewal)
Web development(kewal)Kewal Pradhan
 
Living W And Wo Unions
Living W And Wo UnionsLiving W And Wo Unions
Living W And Wo Unionsmadamseane
 
Str8ts - Solution to Weekly Extreme Str8ts #33 (with one guess)
Str8ts - Solution to Weekly Extreme Str8ts #33 (with one guess)Str8ts - Solution to Weekly Extreme Str8ts #33 (with one guess)
Str8ts - Solution to Weekly Extreme Str8ts #33 (with one guess)SlowThinker
 
Microsoft power point automation-opensourcetestingtools_matrix-1
Microsoft power point   automation-opensourcetestingtools_matrix-1Microsoft power point   automation-opensourcetestingtools_matrix-1
Microsoft power point automation-opensourcetestingtools_matrix-1tactqa
 
June 2012 1ID Fort Riley Monthly News Update
June 2012 1ID Fort Riley Monthly News Update June 2012 1ID Fort Riley Monthly News Update
June 2012 1ID Fort Riley Monthly News Update Noel Waterman
 
Reporte fotográfico oficinas mqpower - 2016 1a semana
Reporte fotográfico   oficinas mqpower - 2016 1a semanaReporte fotográfico   oficinas mqpower - 2016 1a semana
Reporte fotográfico oficinas mqpower - 2016 1a semanaHoracio Padilla Quirarte
 

Viewers also liked (17)

Comece agora
Comece agoraComece agora
Comece agora
 
November 2012 Thunderbolt Blast
November 2012 Thunderbolt BlastNovember 2012 Thunderbolt Blast
November 2012 Thunderbolt Blast
 
F.E.S-Board® Brochure
F.E.S-Board® BrochureF.E.S-Board® Brochure
F.E.S-Board® Brochure
 
Armor Newsletter 1st QRT 2013
Armor Newsletter 1st QRT 2013 Armor Newsletter 1st QRT 2013
Armor Newsletter 1st QRT 2013
 
Bishopope
BishopopeBishopope
Bishopope
 
Using Vim
Using VimUsing Vim
Using Vim
 
Jan/Feb 2013 Devil's Corner Newsletter
Jan/Feb 2013 Devil's Corner NewsletterJan/Feb 2013 Devil's Corner Newsletter
Jan/Feb 2013 Devil's Corner Newsletter
 
Web development(kewal)
Web development(kewal)Web development(kewal)
Web development(kewal)
 
Living W And Wo Unions
Living W And Wo UnionsLiving W And Wo Unions
Living W And Wo Unions
 
Str8ts - Solution to Weekly Extreme Str8ts #33 (with one guess)
Str8ts - Solution to Weekly Extreme Str8ts #33 (with one guess)Str8ts - Solution to Weekly Extreme Str8ts #33 (with one guess)
Str8ts - Solution to Weekly Extreme Str8ts #33 (with one guess)
 
Design I love
Design I loveDesign I love
Design I love
 
Microsoft power point automation-opensourcetestingtools_matrix-1
Microsoft power point   automation-opensourcetestingtools_matrix-1Microsoft power point   automation-opensourcetestingtools_matrix-1
Microsoft power point automation-opensourcetestingtools_matrix-1
 
June 2012 1ID Fort Riley Monthly News Update
June 2012 1ID Fort Riley Monthly News Update June 2012 1ID Fort Riley Monthly News Update
June 2012 1ID Fort Riley Monthly News Update
 
Highlyeffectiveschoollibraryprogram
HighlyeffectiveschoollibraryprogramHighlyeffectiveschoollibraryprogram
Highlyeffectiveschoollibraryprogram
 
Reporte fotográfico oficinas mqpower - 2016 1a semana
Reporte fotográfico   oficinas mqpower - 2016 1a semanaReporte fotográfico   oficinas mqpower - 2016 1a semana
Reporte fotográfico oficinas mqpower - 2016 1a semana
 
exam_strategies_facilitator_guide(goerzen2011)
exam_strategies_facilitator_guide(goerzen2011)exam_strategies_facilitator_guide(goerzen2011)
exam_strategies_facilitator_guide(goerzen2011)
 
Bhsec q cto y2 night 2014
Bhsec q cto y2 night 2014 Bhsec q cto y2 night 2014
Bhsec q cto y2 night 2014
 

Similar to Beware of Phishing Scams

How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayMichele Chubirka
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldAvishek Datta
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Phishing Awareness Training.pptx
Phishing Awareness Training.pptxPhishing Awareness Training.pptx
Phishing Awareness Training.pptxHajar Bouchriha
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Social Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansSocial Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansRob Ragan
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxAbdullaFatiya3
 
3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of Data3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of DataMomina Mateen
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & PhishingGrittyCC
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)aleeya91
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDumindu Pahalawatta
 
Computer crime by inqilab patel
Computer crime by inqilab patelComputer crime by inqilab patel
Computer crime by inqilab patelInqilab Patel
 

Similar to Beware of Phishing Scams (20)

CYBER SECURITY _ PHISHING
CYBER SECURITY _ PHISHINGCYBER SECURITY _ PHISHING
CYBER SECURITY _ PHISHING
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Day 2
Day 2Day 2
Day 2
 
Phishing Awareness Training.pptx
Phishing Awareness Training.pptxPhishing Awareness Training.pptx
Phishing Awareness Training.pptx
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Phishing and prevention
Phishing and preventionPhishing and prevention
Phishing and prevention
 
Social Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansSocial Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response Plans
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
 
Ffiec presentation
Ffiec presentationFfiec presentation
Ffiec presentation
 
3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of Data3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of Data
 
Phishing
PhishingPhishing
Phishing
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Phis
PhisPhis
Phis
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Computer crime by inqilab patel
Computer crime by inqilab patelComputer crime by inqilab patel
Computer crime by inqilab patel
 
One of 2 protect your business
One of 2 protect your businessOne of 2 protect your business
One of 2 protect your business
 

More from Noel Waterman

6 February 2013 1 ABCT Weekly Newsletter
6 February  2013 1 ABCT Weekly Newsletter6 February  2013 1 ABCT Weekly Newsletter
6 February 2013 1 ABCT Weekly NewsletterNoel Waterman
 
Policy 13 Motorcycle, Moped, Motor Scooter, and All-terrain vehicle
Policy 13   Motorcycle, Moped, Motor Scooter, and All-terrain vehicle Policy 13   Motorcycle, Moped, Motor Scooter, and All-terrain vehicle
Policy 13 Motorcycle, Moped, Motor Scooter, and All-terrain vehicle Noel Waterman
 
MISC Scholarship Guide 2012 2013
MISC Scholarship Guide 2012 2013MISC Scholarship Guide 2012 2013
MISC Scholarship Guide 2012 2013Noel Waterman
 
30 January 2013 1ABCT Weekly Newsletter
30 January 2013 1ABCT Weekly Newsletter30 January 2013 1ABCT Weekly Newsletter
30 January 2013 1ABCT Weekly NewsletterNoel Waterman
 
25 Jan 2013 Network Meeting
25 Jan 2013 Network Meeting 25 Jan 2013 Network Meeting
25 Jan 2013 Network Meeting Noel Waterman
 
25 Jan 2013 Network Meeting Slides
25 Jan 2013 Network Meeting Slides 25 Jan 2013 Network Meeting Slides
25 Jan 2013 Network Meeting Slides Noel Waterman
 
Threat and Mitigation
Threat and MitigationThreat and Mitigation
Threat and MitigationNoel Waterman
 
Brochure protect operational_info_sm1
Brochure protect operational_info_sm1Brochure protect operational_info_sm1
Brochure protect operational_info_sm1Noel Waterman
 
15 January 2013 1ABCT Weekly Newsletter
15 January 2013 1ABCT Weekly Newsletter15 January 2013 1ABCT Weekly Newsletter
15 January 2013 1ABCT Weekly NewsletterNoel Waterman
 
Fort Riley Combined Scholarship 2012 2013 Application
Fort Riley Combined Scholarship  2012 2013 ApplicationFort Riley Combined Scholarship  2012 2013 Application
Fort Riley Combined Scholarship 2012 2013 ApplicationNoel Waterman
 
9 January 2013 1ABCT Weekly Newsletter
9 January 2013 1ABCT Weekly Newsletter9 January 2013 1ABCT Weekly Newsletter
9 January 2013 1ABCT Weekly NewsletterNoel Waterman
 
3 January 2013 1ABCT Weekly Newsletter
3 January 2013 1ABCT Weekly Newsletter3 January 2013 1ABCT Weekly Newsletter
3 January 2013 1ABCT Weekly NewsletterNoel Waterman
 
Thunderbolt Blast- Dec 12 Monthly Armor School Newsletter
Thunderbolt Blast- Dec 12 Monthly Armor School Newsletter Thunderbolt Blast- Dec 12 Monthly Armor School Newsletter
Thunderbolt Blast- Dec 12 Monthly Armor School Newsletter Noel Waterman
 
19 December 2012 1ABCT Weekly Newsletter
19 December 2012 1ABCT Weekly Newsletter19 December 2012 1ABCT Weekly Newsletter
19 December 2012 1ABCT Weekly NewsletterNoel Waterman
 
19 December 2012 1ABCT Weekly Newsletter
19 December 2012 1ABCT Weekly Newsletter19 December 2012 1ABCT Weekly Newsletter
19 December 2012 1ABCT Weekly NewsletterNoel Waterman
 
Tips for talking with and helping children traumatic event
Tips for talking with and helping children traumatic eventTips for talking with and helping children traumatic event
Tips for talking with and helping children traumatic eventNoel Waterman
 
December 2012 1ID Fort Riley Monthly News Update
December 2012 1ID Fort Riley Monthly News UpdateDecember 2012 1ID Fort Riley Monthly News Update
December 2012 1ID Fort Riley Monthly News UpdateNoel Waterman
 
5 December 2012 1ABCT Weekly Newsletter
5 December 2012 1ABCT Weekly Newsletter5 December 2012 1ABCT Weekly Newsletter
5 December 2012 1ABCT Weekly NewsletterNoel Waterman
 
NOVEMBER 29 2012 NETWORK SLIDES
NOVEMBER 29 2012 NETWORK SLIDESNOVEMBER 29 2012 NETWORK SLIDES
NOVEMBER 29 2012 NETWORK SLIDESNoel Waterman
 

More from Noel Waterman (20)

6 February 2013 1 ABCT Weekly Newsletter
6 February  2013 1 ABCT Weekly Newsletter6 February  2013 1 ABCT Weekly Newsletter
6 February 2013 1 ABCT Weekly Newsletter
 
Policy 13 Motorcycle, Moped, Motor Scooter, and All-terrain vehicle
Policy 13   Motorcycle, Moped, Motor Scooter, and All-terrain vehicle Policy 13   Motorcycle, Moped, Motor Scooter, and All-terrain vehicle
Policy 13 Motorcycle, Moped, Motor Scooter, and All-terrain vehicle
 
MISC Scholarship Guide 2012 2013
MISC Scholarship Guide 2012 2013MISC Scholarship Guide 2012 2013
MISC Scholarship Guide 2012 2013
 
30 January 2013 1ABCT Weekly Newsletter
30 January 2013 1ABCT Weekly Newsletter30 January 2013 1ABCT Weekly Newsletter
30 January 2013 1ABCT Weekly Newsletter
 
Teen parenting 2013
Teen parenting 2013Teen parenting 2013
Teen parenting 2013
 
25 Jan 2013 Network Meeting
25 Jan 2013 Network Meeting 25 Jan 2013 Network Meeting
25 Jan 2013 Network Meeting
 
25 Jan 2013 Network Meeting Slides
25 Jan 2013 Network Meeting Slides 25 Jan 2013 Network Meeting Slides
25 Jan 2013 Network Meeting Slides
 
Threat and Mitigation
Threat and MitigationThreat and Mitigation
Threat and Mitigation
 
Brochure protect operational_info_sm1
Brochure protect operational_info_sm1Brochure protect operational_info_sm1
Brochure protect operational_info_sm1
 
15 January 2013 1ABCT Weekly Newsletter
15 January 2013 1ABCT Weekly Newsletter15 January 2013 1ABCT Weekly Newsletter
15 January 2013 1ABCT Weekly Newsletter
 
Fort Riley Combined Scholarship 2012 2013 Application
Fort Riley Combined Scholarship  2012 2013 ApplicationFort Riley Combined Scholarship  2012 2013 Application
Fort Riley Combined Scholarship 2012 2013 Application
 
9 January 2013 1ABCT Weekly Newsletter
9 January 2013 1ABCT Weekly Newsletter9 January 2013 1ABCT Weekly Newsletter
9 January 2013 1ABCT Weekly Newsletter
 
3 January 2013 1ABCT Weekly Newsletter
3 January 2013 1ABCT Weekly Newsletter3 January 2013 1ABCT Weekly Newsletter
3 January 2013 1ABCT Weekly Newsletter
 
Thunderbolt Blast- Dec 12 Monthly Armor School Newsletter
Thunderbolt Blast- Dec 12 Monthly Armor School Newsletter Thunderbolt Blast- Dec 12 Monthly Armor School Newsletter
Thunderbolt Blast- Dec 12 Monthly Armor School Newsletter
 
19 December 2012 1ABCT Weekly Newsletter
19 December 2012 1ABCT Weekly Newsletter19 December 2012 1ABCT Weekly Newsletter
19 December 2012 1ABCT Weekly Newsletter
 
19 December 2012 1ABCT Weekly Newsletter
19 December 2012 1ABCT Weekly Newsletter19 December 2012 1ABCT Weekly Newsletter
19 December 2012 1ABCT Weekly Newsletter
 
Tips for talking with and helping children traumatic event
Tips for talking with and helping children traumatic eventTips for talking with and helping children traumatic event
Tips for talking with and helping children traumatic event
 
December 2012 1ID Fort Riley Monthly News Update
December 2012 1ID Fort Riley Monthly News UpdateDecember 2012 1ID Fort Riley Monthly News Update
December 2012 1ID Fort Riley Monthly News Update
 
5 December 2012 1ABCT Weekly Newsletter
5 December 2012 1ABCT Weekly Newsletter5 December 2012 1ABCT Weekly Newsletter
5 December 2012 1ABCT Weekly Newsletter
 
NOVEMBER 29 2012 NETWORK SLIDES
NOVEMBER 29 2012 NETWORK SLIDESNOVEMBER 29 2012 NETWORK SLIDES
NOVEMBER 29 2012 NETWORK SLIDES
 

Beware of Phishing Scams

  • 1. Enterprise Center (NEC) Assurance Officer and your servicing Network http://www.us-cert.gov/reading_room/emailscams_0905.pdf Report Phishing Attacks to Your Local Information Recognizing & Avoiding Email Scams: SUSPICIOUS ACTIVITY REPORTING servicing Network Enterprise Center (NEC). your local Information Assurance Officer and • If you are using a government computer, contact just experienced. and inform them about the phishing attack you • Click the “contact us” link found on most websites account information and password. • Follow the website’s instructions to change your or “change password” link. • Sign into your account and click the “user profile” address bar. • Type the website name in your browser’s real website: • Change your password immediately at the Anti Phishing Quick Reaction Drill Phished! I think I’ve been Help! What is Phishing? Why Phishing Works Phishing is an attempt by an individual or group to solicit personal information from unsuspecting users by employing social engineering techniques (i.e., • We are easily enticed —we trust known manipulating people into performing actions or divulging brands/logos confidential information). Phishing emails are crafted to appear as if they were sent from a legitimate organization • Lack of user education and awareness or known individual. These emails often attempt to attract users to click on a link that will take the user to a fraudulent • Lack of Information Assurance knowledge website that appears legitimate. The user then may be and warning indicators asked to provide personal information, such as account usernames and passwords that can further expose them, their network, and their unit to future compromises.  • Visually deceptive text In order to fully understand phishing and how it can impact • Image masking you and your unit, you should be aware that there are different types of phishing: • Image mimicking Windows Phishing is usually an e-mail sent to a large group of people that attempts to scam the recipients. The people the message is sent to often do not have anything in common. Spear phishing is a message sent to a smaller, more select group of targeted people or to a single individual. Whaling or whale phishing is a highly personalized message sent to senior executives, high-level officials ,or their personal executive staff members.
  • 2. Enterprise Center (NEC) Assurance Officer and your servicing Network http://www.us-cert.gov/reading_room/emailscams_0905.pdf Report Phishing Attacks to Your Local Information Recognizing & Avoiding Email Scams: SUSPICIOUS ACTIVITY REPORTING servicing Network Enterprise Center (NEC). your local Information Assurance Officer and • If you are using a government computer, contact just experienced. and inform them about the phishing attack you • Click the “contact us” link found on most websites account information and password. • Follow the website’s instructions to change your or “change password” link. • Sign into your account and click the “user profile” address bar. • Type the website name in your browser’s real website: • Change your password immediately at the Anti Phishing Quick Reaction Drill Phished! I think I’ve been Help! What is Phishing? Why Phishing Works Phishing is an attempt by an individual or group to solicit personal information from unsuspecting users by employing social engineering techniques (i.e., • We are easily enticed —we trust known manipulating people into performing actions or divulging brands/logos confidential information). Phishing emails are crafted to appear as if they were sent from a legitimate organization • Lack of user education and awareness or known individual. These emails often attempt to attract users to click on a link that will take the user to a fraudulent • Lack of Information Assurance knowledge website that appears legitimate. The user then may be and warning indicators asked to provide personal information, such as account usernames and passwords that can further expose them, their network, and their unit to future compromises.  • Visually deceptive text In order to fully understand phishing and how it can impact • Image masking you and your unit, you should be aware that there are different types of phishing: • Image mimicking Windows Phishing is usually an e-mail sent to a large group of people that attempts to scam the recipients. The people the message is sent to often do not have anything in common. Spear phishing is a message sent to a smaller, more select group of targeted people or to a single individual. Whaling or whale phishing is a highly personalized message sent to senior executives, high-level officials ,or their personal executive staff members.
  • 3. Enterprise Center (NEC) Assurance Officer and your servicing Network http://www.us-cert.gov/reading_room/emailscams_0905.pdf Report Phishing Attacks to Your Local Information Recognizing & Avoiding Email Scams: SUSPICIOUS ACTIVITY REPORTING servicing Network Enterprise Center (NEC). your local Information Assurance Officer and • If you are using a government computer, contact just experienced. and inform them about the phishing attack you • Click the “contact us” link found on most websites account information and password. • Follow the website’s instructions to change your or “change password” link. • Sign into your account and click the “user profile” address bar. • Type the website name in your browser’s real website: • Change your password immediately at the Anti Phishing Quick Reaction Drill Phished! I think I’ve been Help! What is Phishing? Why Phishing Works Phishing is an attempt by an individual or group to solicit personal information from unsuspecting users by employing social engineering techniques (i.e., • We are easily enticed —we trust known manipulating people into performing actions or divulging brands/logos confidential information). Phishing emails are crafted to appear as if they were sent from a legitimate organization • Lack of user education and awareness or known individual. These emails often attempt to attract users to click on a link that will take the user to a fraudulent • Lack of Information Assurance knowledge website that appears legitimate. The user then may be and warning indicators asked to provide personal information, such as account usernames and passwords that can further expose them, their network, and their unit to future compromises.  • Visually deceptive text In order to fully understand phishing and how it can impact • Image masking you and your unit, you should be aware that there are different types of phishing: • Image mimicking Windows Phishing is usually an e-mail sent to a large group of people that attempts to scam the recipients. The people the message is sent to often do not have anything in common. Spear phishing is a message sent to a smaller, more select group of targeted people or to a single individual. Whaling or whale phishing is a highly personalized message sent to senior executives, high-level officials ,or their personal executive staff members.
  • 4. How Phishing Works User Awareness Protect Yourself and • Most phishing attempts are for identity theft, but Your Organization phishing is also being used to gain access to online banking, federal, and DoD information DO • Phishing Attacks can be geared to collect personal information such as: SSN, mother’s • Watch out for phishing maiden name, date of birth, passwords, credit card numbers, etc. • Delete suspicious emails • Phishing emails not only attempt to trick you • Contact your Information Assurance Officer into giving out sensitive information, but also or your servicing Network Enterprise Center can include malicious software (NEC) if you have questions about emails • Malicious software can be viruses and other • Report any potential incidents computer code designed to allow a hacker to use your computer for illegal Internet activity,  DO NOT or to access your unit’s network to gather DoD   information • Open suspicious emails • Malicious code may capture your keystrokes or • Click on suspicious links in emails or pop- capture your personal and work files and send up windows them to people without your knowledge • Call telephone numbers provided in suspicious emails • Disclose any information
  • 5. How Phishing Works User Awareness Protect Yourself and • Most phishing attempts are for identity theft, but Your Organization phishing is also being used to gain access to online banking, federal, and DoD information DO • Phishing Attacks can be geared to collect personal information such as: SSN, mother’s • Watch out for phishing maiden name, date of birth, passwords, credit card numbers, etc. • Delete suspicious emails • Phishing emails not only attempt to trick you • Contact your Information Assurance Officer into giving out sensitive information, but also or your servicing Network Enterprise Center can include malicious software (NEC) if you have questions about emails • Malicious software can be viruses and other • Report any potential incidents computer code designed to allow a hacker to use your computer for illegal Internet activity,  DO NOT or to access your unit’s network to gather DoD   information • Open suspicious emails • Malicious code may capture your keystrokes or • Click on suspicious links in emails or pop- capture your personal and work files and send up windows them to people without your knowledge • Call telephone numbers provided in suspicious emails • Disclose any information
  • 6. How Phishing Works User Awareness Protect Yourself and • Most phishing attempts are for identity theft, but Your Organization phishing is also being used to gain access to online banking, federal, and DoD information DO • Phishing Attacks can be geared to collect personal information such as: SSN, mother’s • Watch out for phishing maiden name, date of birth, passwords, credit card numbers, etc. • Delete suspicious emails • Phishing emails not only attempt to trick you • Contact your Information Assurance Officer into giving out sensitive information, but also or your servicing Network Enterprise Center can include malicious software (NEC) if you have questions about emails • Malicious software can be viruses and other • Report any potential incidents computer code designed to allow a hacker to use your computer for illegal Internet activity,  DO NOT or to access your unit’s network to gather DoD   information • Open suspicious emails • Malicious code may capture your keystrokes or • Click on suspicious links in emails or pop- capture your personal and work files and send up windows them to people without your knowledge • Call telephone numbers provided in suspicious emails • Disclose any information
  • 7. Enterprise Center (NEC) Assurance Officer and your servicing Network http://www.us-cert.gov/reading_room/emailscams_0905.pdf Report Phishing Attacks to Your Local Information Recognizing & Avoiding Email Scams: SUSPICIOUS ACTIVITY REPORTING servicing Network Enterprise Center (NEC). your local Information Assurance Officer and • If you are using a government computer, contact just experienced. and inform them about the phishing attack you • Click the “contact us” link found on most websites account information and password. • Follow the website’s instructions to change your or “change password” link. • Sign into your account and click the “user profile” address bar. • Type the website name in your browser’s real website: • Change your password immediately at the Anti Phishing Quick Reaction Drill Phished! I think I’ve been Help! What is Phishing? Why Phishing Works Phishing is an attempt by an individual or group to solicit personal information from unsuspecting users by employing social engineering techniques (i.e., • We are easily enticed —we trust known manipulating people into performing actions or divulging brands/logos confidential information). Phishing emails are crafted to appear as if they were sent from a legitimate organization • Lack of user education and awareness or known individual. These emails often attempt to attract users to click on a link that will take the user to a fraudulent • Lack of Information Assurance knowledge website that appears legitimate. The user then may be and warning indicators asked to provide personal information, such as account usernames and passwords that can further expose them, their network, and their unit to future compromises.  • Visually deceptive text In order to fully understand phishing and how it can impact • Image masking you and your unit, you should be aware that there are different types of phishing: • Image mimicking Windows Phishing is usually an e-mail sent to a large group of people that attempts to scam the recipients. The people the message is sent to often do not have anything in common. Spear phishing is a message sent to a smaller, more select group of targeted people or to a single individual. Whaling or whale phishing is a highly personalized message sent to senior executives, high-level officials ,or their personal executive staff members.