SlideShare a Scribd company logo
Don’t Get Caught by
Phishing Emails!
1-855-AVENTIS | AventisSystems.com
Why Cybercriminals Go Phishing
To Take Advantage of Technology & Busy Lifestyles to Gain
Access to Confidential Information
 Personal Accounts
 Corporate Accounts
 Company Data
1-855-AVENTIS | AventisSystems.com
Training for Password Requests
Particularly Important for Larger Companies
 Employees May Not Know All Staff
 Easier to Pose as a Member of the Company
1-855-AVENTIS | AventisSystems.com
Create Password Policies
Never Provide Employee Passwords to Anyone
 Ensure Company Never Requests Employee Passwords
 Employees Will Know Any Request is a Scam
1-855-AVENTIS | AventisSystems.com
Training to Identify Scam Emails
Emails with Links & Attachments
 Unrecognizable Sender
 Unexpected Attachment
 Bring Suspicious Emails to IT Department
1-855-AVENTIS | AventisSystems.com
Take Your Time
Do Not Review Emails Too Quickly!
 Scammer May “Spoof” a Familiar Email Address
 Quick Review May Miss Slight Difference
 Example: One Letter Wrong or Missing
1-855-AVENTIS | AventisSystems.com
The Key
Be Cautious!
1-855-AVENTIS | AventisSystems.com
Take a Look
Advanced IT Services - Network & Security Solutions
● http://www.aventissystems.com/Network-and-Security-Solutions-s/8262.htm
Hover & Click
1-855-AVENTIS | AventisSystems.com
Sign Up
www.AventisSystems.com
1-855-AVENTIS | AventisSystems.com
Follow Us
@AventisSystems
1-855-AVENTIS | AventisSystems.com
Thank You!

More Related Content

Similar to Don’t Get Caught by Phishing Emails!

KEEP IT SAFE FINAL IT Security A6 FINAL 2 (1)
KEEP IT SAFE FINAL IT Security A6 FINAL 2 (1)KEEP IT SAFE FINAL IT Security A6 FINAL 2 (1)
KEEP IT SAFE FINAL IT Security A6 FINAL 2 (1)
Jenine Sanchez
 
Valueleaf technology features
Valueleaf technology featuresValueleaf technology features
Valueleaf technology features
Shweta Jain
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
viimsikool
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
Payza
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 

Similar to Don’t Get Caught by Phishing Emails! (20)

KEEP IT SAFE FINAL IT Security A6 FINAL 2 (1)
KEEP IT SAFE FINAL IT Security A6 FINAL 2 (1)KEEP IT SAFE FINAL IT Security A6 FINAL 2 (1)
KEEP IT SAFE FINAL IT Security A6 FINAL 2 (1)
 
Email
EmailEmail
Email
 
Password reset email best Practices
Password reset email best PracticesPassword reset email best Practices
Password reset email best Practices
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdf
 
Valueleaf technology features
Valueleaf technology featuresValueleaf technology features
Valueleaf technology features
 
A Guide to Cyber Etiquette.pdf
A Guide to Cyber Etiquette.pdfA Guide to Cyber Etiquette.pdf
A Guide to Cyber Etiquette.pdf
 
10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber Security10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber Security
 
Digital Marketing 101 for Arts Presenters: Connecting in the inbox with ema...
Digital Marketing 101 for Arts Presenters: Connecting in the inbox with ema...Digital Marketing 101 for Arts Presenters: Connecting in the inbox with ema...
Digital Marketing 101 for Arts Presenters: Connecting in the inbox with ema...
 
NYC Admin Zone: Build Your Security Superpowers
NYC Admin Zone:  Build Your Security SuperpowersNYC Admin Zone:  Build Your Security Superpowers
NYC Admin Zone: Build Your Security Superpowers
 
The Phishing Net
The Phishing NetThe Phishing Net
The Phishing Net
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techies
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
 
Check your network security
Check your network securityCheck your network security
Check your network security
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
5 Vital Online Security Tips for QNET Professionals
5 Vital Online Security Tips for QNET Professionals5 Vital Online Security Tips for QNET Professionals
5 Vital Online Security Tips for QNET Professionals
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
 
Risk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure WorldRisk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure World
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 

More from Aventis Systems, Inc.

More from Aventis Systems, Inc. (20)

Remote Desktop Services - Who Needs It?
Remote Desktop Services - Who Needs It?Remote Desktop Services - Who Needs It?
Remote Desktop Services - Who Needs It?
 
The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14
 
Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]
Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]
Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]
 
Windows Server 2016 Licensing Tips
Windows Server 2016 Licensing TipsWindows Server 2016 Licensing Tips
Windows Server 2016 Licensing Tips
 
The Case for SSDs - Market Domination & Why You Need Them in Your Environment
The Case for SSDs - Market Domination & Why You Need Them in Your EnvironmentThe Case for SSDs - Market Domination & Why You Need Them in Your Environment
The Case for SSDs - Market Domination & Why You Need Them in Your Environment
 
Benefits of Upgrading to Windows 10 in the Government Sector
Benefits of Upgrading to Windows 10 in the Government SectorBenefits of Upgrading to Windows 10 in the Government Sector
Benefits of Upgrading to Windows 10 in the Government Sector
 
Why Government Agencies Should Consider Dell 13th Gen Servers
Why Government Agencies Should Consider Dell 13th Gen ServersWhy Government Agencies Should Consider Dell 13th Gen Servers
Why Government Agencies Should Consider Dell 13th Gen Servers
 
Tech Spec Roundup - All-in-One Desktop PCs
Tech Spec Roundup - All-in-One Desktop PCsTech Spec Roundup - All-in-One Desktop PCs
Tech Spec Roundup - All-in-One Desktop PCs
 
SMB Benefits of VPS Solutions - Availability, Security, and Support
SMB Benefits of VPS Solutions - Availability, Security, and SupportSMB Benefits of VPS Solutions - Availability, Security, and Support
SMB Benefits of VPS Solutions - Availability, Security, and Support
 
Attaching Storage to Blade Infrastructure
Attaching Storage to Blade InfrastructureAttaching Storage to Blade Infrastructure
Attaching Storage to Blade Infrastructure
 
Out-of-Band Management - Why Standard Doesn’t Cut It
Out-of-Band Management - Why Standard Doesn’t Cut ItOut-of-Band Management - Why Standard Doesn’t Cut It
Out-of-Band Management - Why Standard Doesn’t Cut It
 
Government IT Budgets: Spend Now to Save Later
Government IT Budgets: Spend Now to Save LaterGovernment IT Budgets: Spend Now to Save Later
Government IT Budgets: Spend Now to Save Later
 
Veeam Backup Essentials v9 Overview
Veeam Backup Essentials v9 OverviewVeeam Backup Essentials v9 Overview
Veeam Backup Essentials v9 Overview
 
Product Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Product Spotlight: Red Hat Enterprise Linux for Servers and DesktopsProduct Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Product Spotlight: Red Hat Enterprise Linux for Servers and Desktops
 
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
 
Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...
Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...
Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...
 
RIP SQL Server 2005 - Time to Move On!
RIP SQL Server 2005 - Time to Move On!RIP SQL Server 2005 - Time to Move On!
RIP SQL Server 2005 - Time to Move On!
 
What to Do with Your Used IT Hardware
What to Do with Your Used IT HardwareWhat to Do with Your Used IT Hardware
What to Do with Your Used IT Hardware
 
Networking Considerations for IT Labs
Networking Considerations for IT LabsNetworking Considerations for IT Labs
Networking Considerations for IT Labs
 
Don’t Fall Victim to Social Engineering Traps
Don’t Fall Victim to Social Engineering TrapsDon’t Fall Victim to Social Engineering Traps
Don’t Fall Victim to Social Engineering Traps
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 

Don’t Get Caught by Phishing Emails!

Editor's Notes

  1. Phishing emails are seeping into inboxes more and more these days so it is crucial your employees understand how to avoid being scammed. In this webinar, ‘Don’t Get Caught by Phishing Emails!’ we share some tips for safeguarding your organization.
  2. Email phishing scams have been around for quite a while, but they are becoming a larger threat in the more recent years. These types of emails take advantage of technology and people’s busy lifestyles in an attempt to gain access to sensitive information. This information could be personal banking information, or corporate information that could give the individuals responsible access to confidential company data. With years of practice these scammers are able to make themselves look like someone you know, or at least mask themselves as a member of your organization. All it takes is one time to catch someone off guard, and they can have access to things that can cause a lot of damage. Amber Interjection Chad, what are some ways to be on the lookout for phishing scams?
  3. Training and caution are some of the biggest tools you can arm your employees with, especially when your company is large in size. For larger companies, each employee might not be fully aware of the staff the company has which makes them more vulnerable to phishing attempts. For example, if an employee isn’t aware of all of the IT staff currently employed, they may be tricked into responding to an email requesting their password so a new application can be set up for them. They may unknowingly give passwords or remote access to an individual who isn’t part of your organization.
  4. It is recommended that you put policies in place to prevent things like this from happening. Most banking institutions tell their customers that they will never ask for their pin number or passwords, and this practice can be put to use within your organization as well. Ensuring your employees know not to provide their password to anyone, including IT staff, helps protect them from exposing information that could lead to unfortunate consequences. Amber Interjection Those are great points, Chad. Do you have any tips for spotting phishing emails?
  5. For starters, while having rules set up for employees to not give out their passwords is helpful, phishing emails can use other tactics to gain access to a user’s computer and information. Training employees to be extra careful with any emails including links or attachments is another good practice. If the email isn’t from someone who is recognized, or the attachment wasn’t expected, they should bring it to the IT staff’s attention before clicking any link or downloading attachments. Clicking or opening these objects could download malicious software to the user’s computer which could then be used to access their files or the company’s network.
  6. Beyond these training steps employees will still need to exercise caution when opening emails and not move too quickly. It has also been known for hackers to use the email address and profile picture of an employee or email contact you are familiar with to “spoof” their emails. In most cases you will see a familiar picture and email address, but upon further inspection a letter in the email address will be missing or incorrect in a spot that isn’t easily noticed. This is their attempt to catch someone who speeds through their emails.
  7. At any rate, training your employees on these tactics and letting them know to be cautious and vigilant when reading their emails is a very important step to take in preventing phishing attempts. Amber Wrap-up & Close Thank you, Chad! These tips for keeping an eye out for phishing scams are very helpful.
  8. Take at look at our Advanced IT Services which include security consulting services such as providing training for in-house personnel and implementing security best practices.
  9. And don’t forget to sign up to receive product specials and keep up with our techie resources including webinars, blog articles, and more.
  10. You can also stay up-to-date by following us on Facebook and Twitter @AventisSystems.
  11. Thank you for watching!