SlideShare a Scribd company logo
{
Email Security
Awareness
Tips to protect yourself from some common email
dangers & scams
 The driving force is MONEY!
 Drive you to a site to sell you something
 Scams, advanced fee, lottery
 Collect personal information
 Fake AV, Scareware! Ransomware!
 Stealing login credentials
 Key loggers
 Attackers are finding ways to compromise
computer, passwords, data, accounts
 Easier to hack people then find way into company
network through perimeter defenses
Protect Yourself
 Password may be only line of defense for email account
 Don’t reuse passwords for all online accounts
 Compromised password could give access to multiple
accounts or sites
 Avoid common words, names, birthdays
 Use passphrase, mix upper and lower case
letters, numbers, and special characters
 Minimum 14 characters
 Never keep passwords on sticky note on monitor
 Login page using HTTPS required when using unsecure
network (public Hot Spot)
 https://www.microsoft.com/security/pc-security/password-
checker.aspx
Strong Passwords
 Sense of urgency! Act now, respond now, need help
 Don’t think, just click! NOW, NOW, NOW!
 Alarmist messages and threats of account closures
 Any email requesting personal information, bank
account, credit card number, access codes, etc… (Phishing)
 Spelling errors, grammatical errors
 Promises of money for little or no effort
 Work from home (money mule scams)
 Generic greeting, Dear Customer
 Request for help, related to urgency scams, emotional pull
 Sender in foreign county needs help and money
Tips to Avoid Scams
 Send money up front to receive prize
 Deals that sound too good to be true
 Free may have a price tag!
 Electronics, iPads, gift cards, lottery scams, inheritance
scams etc…
 Downloads and attachments
 Fake software updates
 Holiday scams, ecards (zip file attachment or links)
 May lead to unwanted software being loaded on
computer, Trojan horse program with key logger, fake
AV, bot, rootkit, etc…
 Senders email address
 Email may claim to be from BOA, but sender address is
not related to company, EX johndoe@badguysite.com
Tips to Avoid Scams
 Requests to donate to a charitable organization after a
disaster that has been in the news
 Shortened links, or confusing links
 Redirect to bad guys site
 Go directly to company web site if in doubt
 Chain letters
 May be collecting addresses for spammers
 Unsubscribe links, may confirm live email account
 Junk Mail in GroupWise
 Report as spam or set up filter to block future emails
(Gmail, Hotmail, Yahoo, etc…)
 Similar scams may arrive as instant
messages, Skype, Facebook posts, Twitter DMs
 Social networking is a huge target for scams
Tips to Avoid Scams
 No! I don’t need cheap meds!
 Not malicious
 Similar to postal junk mail
 Usually selling merchandise or advertisements
 Link to ecommerce website
 Drive customer to website selling products or offering
services
Spam
 The number “419” refers to the article of the Nigerian
Criminal Code dealing with fraud
 Started before email as Spanish prisoner scam
 Many variations,
 Iraqi gold, blood diamonds, inheritance or investment
scams, etc…
 Advanced fee scams
 Usually involve millions of dollars
 Assistance is needed, transfer money to you and you
earn percentage, catch is paying fees or taxes up front
 Made to believe paying fees or taxes will lead to
“bigger” prize!
Nigerian 419 Email Scams
 There is no big prize or reward!
 Do not respond
 Delete message
 Junkmail, report as spam
Don’t Respond
 URGENCY! Dire need of help!
 Receive email from friend or relative that is in foreign
county and has been robbed
 Needs money to settle bills
Robbed in London
 Call person, try to speak to person to verify their
location
 Never in country that email claims!
 Senders email account has been hacked or accessed by
unauthorized person
 Bad guy sending email to all contacts in address book
 Person is unaware account was hacked and “fake”
emails are being sent
 Person should change password to account
immediately
 Check for forwarding rules
 Contact ISP or email provider for assistance
Never Respond
 To obtain information for the purpose of fraud or
identity theft
 Account may be locked or suspended
 Have short time frame to verify
 Problem with payment or credit card
 Verify login credentials
 Email account storage limits
 URGRNCY pull is involved
Phishing
 Can use company logos
 Copy from web site
 Look and feel authentic
 Links do not go to actual company website
 Shortened links, bit.ly
 Redirect to bad guy site
 May sign name of actual employee with company
 Senders email address is not related to company
Phishing
 Phishing Video
 http://onguardonline.gov/media/video-0007-phishy-
office
Phishing
 More specific
 Targeted audience
 Directed at specific company, people at certain levels in
company or in certain departments
Spear Phishing
 The name is derived from SMS Phishing, SMS (Short
Message Service) is the technology used for text
messages on cell phones
 URGENCY!
 (Voice phISHING) it is the voice counterpart to
phishing. The caller can ask for personal information
or direct user to malicious website.
 Support call to download “fake” software update.
 Caller ID numbers and names can be spoofed.
Smishing
Smishing Example
 Never reply to an email to verify personal
information, bank account numbers, credit card
numbers, passwords, etc…
 Call bank or credit card company directly
 Verify if they sent email
 Some companies have ways to report suspected fraud
emails
Don’t Respond
 Microsoft and Adobe never send updates through
email
 Attachments will not update programs, but load
unwanted software
 Links will not take to you to company web site or
download attachment
 Go directly to company website
 Microsoft Updates through IE
 Check for updates in Adobe Reader
 Run PSI or Qualys Browser Check to verify updates are
available
Software Updates
 Work from home scams
 Make money part time, spare time
 Have computer you can make thousands of dollars
 Open bank account, bad guy deposits money, you
transfer, or with draw money and wire it to
someone, and keep percentage
 No legitimate company works like this!
Money Mule Scams
 Zeus Trojan bust reveals sophisticated 'money
mules' operation in U.S. (September 2010)
 https://www.computerworld.com/s/article/9189038/Ze
us_Trojan_bust_reveals_sophisticated_money_mules_
operation_in_U.S
In the News
 Phishing Game
 http://onguardonline.gov/media/game-0011-phishing-
scams
 Scam and Spam Game
 http://onguardonline.gov/media/game-0012-spam-
scam-slam
For Fun
 http://ilookbothways.com/spot-the-spam/
 http://www.microsoft.com/security/online-
privacy/phishing-symptoms.aspx
 http://onguardonline.gov/topics/avoid-scams
Additional Resources

More Related Content

What's hot

Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
NetLockSmith
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
G Prachi
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
MohammedYaseen638128
 
User security awareness
User security awarenessUser security awareness
User security awareness
K. A. M Lutfullah
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentation
Wan Solo
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
Paige Rasid
 
Spam
SpamSpam
Phishing
PhishingPhishing
Phishing
Sagar Rai
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
Sanjiv Arora
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Innocent Korie
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
PranjalShah18
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
William Mann
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
Michel Bitter
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
Community IT Innovators
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
Network Security
Network Security Network Security
Network Security
Abdul Qadir Pattal
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
Raghav Bisht
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
CheapSSLsecurity
 

What's hot (20)

Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentation
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Spam
SpamSpam
Spam
 
Phishing
PhishingPhishing
Phishing
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Network Security
Network Security Network Security
Network Security
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 

Viewers also liked

Sisener substation eng
Sisener substation engSisener substation eng
Sisener substation engSISENER
 
Capacitación como factor de la modernización de los distritos de riego.
Capacitación como factor de la modernización de los distritos de riego.Capacitación como factor de la modernización de los distritos de riego.
Capacitación como factor de la modernización de los distritos de riego.
Academia de Ingeniería de México
 
19 la innovación es mujer y tiene curvas lexia
19 la innovación es mujer y tiene curvas lexia19 la innovación es mujer y tiene curvas lexia
19 la innovación es mujer y tiene curvas lexiaEvelyn Femat
 
El mercado aeronáutico francés 2013 - Cámara Franco-Española de Comercio
El mercado aeronáutico francés 2013 - Cámara Franco-Española de ComercioEl mercado aeronáutico francés 2013 - Cámara Franco-Española de Comercio
El mercado aeronáutico francés 2013 - Cámara Franco-Española de Comercio
Bastien Develey
 
Itec2
Itec2Itec2
Itec2
giammaria
 
Contact Center Technology Trends
Contact Center Technology TrendsContact Center Technology Trends
Contact Center Technology Trends
DATAMARK
 
Umbaupreise I
Umbaupreise IUmbaupreise I
Umbaupreise IHirmer
 
Pipe wizard olympus
Pipe wizard olympusPipe wizard olympus
Pipe wizard olympus
Sungsoo Han
 
Institució Familiar d'Educació. Nova imatge
Institució Familiar d'Educació. Nova imatgeInstitució Familiar d'Educació. Nova imatge
Institució Familiar d'Educació. Nova imatgeinstitucio
 
Sintesis informativa 08 julio 2011
Sintesis informativa 08 julio 2011Sintesis informativa 08 julio 2011
Sintesis informativa 08 julio 2011megaradioexpress
 
Material 16 17 llistat per fer public
Material 16 17  llistat per fer publicMaterial 16 17  llistat per fer public
Material 16 17 llistat per fer public
ceippuigdenvalls
 
Atelier-Conférence sur la posture en entreprise - AlinéaSanté
Atelier-Conférence sur la posture en entreprise - AlinéaSantéAtelier-Conférence sur la posture en entreprise - AlinéaSanté
Atelier-Conférence sur la posture en entreprise - AlinéaSanté
alineasante
 
Remote BTS Monitoring Solutions
Remote BTS Monitoring SolutionsRemote BTS Monitoring Solutions
Remote BTS Monitoring Solutions
Rizwan Majeed Khan
 
Top ten caracteristicas del lider
Top ten caracteristicas del liderTop ten caracteristicas del lider
Top ten caracteristicas del lider
Balbino Rodriguez
 
India probiotic dairy products (yogurt, drink, ice cream) market, volume & fo...
India probiotic dairy products (yogurt, drink, ice cream) market, volume & fo...India probiotic dairy products (yogurt, drink, ice cream) market, volume & fo...
India probiotic dairy products (yogurt, drink, ice cream) market, volume & fo...
Renub Research
 
KMA Insights Feb'10 Webinar: SharePoint In The Cloud Or On-Premise?
KMA Insights Feb'10 Webinar: SharePoint In The Cloud Or On-Premise?KMA Insights Feb'10 Webinar: SharePoint In The Cloud Or On-Premise?
KMA Insights Feb'10 Webinar: SharePoint In The Cloud Or On-Premise?
Knowledge Management Associates, LLC
 
My first song book(vol2) disney
My first song book(vol2) disneyMy first song book(vol2) disney
My first song book(vol2) disneyhome
 
Medicación de urgencias
Medicación de urgenciasMedicación de urgencias
Medicación de urgenciasEquipoURG
 

Viewers also liked (20)

Sisener substation eng
Sisener substation engSisener substation eng
Sisener substation eng
 
Capacitación como factor de la modernización de los distritos de riego.
Capacitación como factor de la modernización de los distritos de riego.Capacitación como factor de la modernización de los distritos de riego.
Capacitación como factor de la modernización de los distritos de riego.
 
19 la innovación es mujer y tiene curvas lexia
19 la innovación es mujer y tiene curvas lexia19 la innovación es mujer y tiene curvas lexia
19 la innovación es mujer y tiene curvas lexia
 
El mercado aeronáutico francés 2013 - Cámara Franco-Española de Comercio
El mercado aeronáutico francés 2013 - Cámara Franco-Española de ComercioEl mercado aeronáutico francés 2013 - Cámara Franco-Española de Comercio
El mercado aeronáutico francés 2013 - Cámara Franco-Española de Comercio
 
Itec2
Itec2Itec2
Itec2
 
Contact Center Technology Trends
Contact Center Technology TrendsContact Center Technology Trends
Contact Center Technology Trends
 
Umbaupreise I
Umbaupreise IUmbaupreise I
Umbaupreise I
 
Pipe wizard olympus
Pipe wizard olympusPipe wizard olympus
Pipe wizard olympus
 
Institució Familiar d'Educació. Nova imatge
Institució Familiar d'Educació. Nova imatgeInstitució Familiar d'Educació. Nova imatge
Institució Familiar d'Educació. Nova imatge
 
Sintesis informativa 08 julio 2011
Sintesis informativa 08 julio 2011Sintesis informativa 08 julio 2011
Sintesis informativa 08 julio 2011
 
Material 16 17 llistat per fer public
Material 16 17  llistat per fer publicMaterial 16 17  llistat per fer public
Material 16 17 llistat per fer public
 
Atelier-Conférence sur la posture en entreprise - AlinéaSanté
Atelier-Conférence sur la posture en entreprise - AlinéaSantéAtelier-Conférence sur la posture en entreprise - AlinéaSanté
Atelier-Conférence sur la posture en entreprise - AlinéaSanté
 
Remote BTS Monitoring Solutions
Remote BTS Monitoring SolutionsRemote BTS Monitoring Solutions
Remote BTS Monitoring Solutions
 
Top ten caracteristicas del lider
Top ten caracteristicas del liderTop ten caracteristicas del lider
Top ten caracteristicas del lider
 
India probiotic dairy products (yogurt, drink, ice cream) market, volume & fo...
India probiotic dairy products (yogurt, drink, ice cream) market, volume & fo...India probiotic dairy products (yogurt, drink, ice cream) market, volume & fo...
India probiotic dairy products (yogurt, drink, ice cream) market, volume & fo...
 
Presentacion uaeos 2015
Presentacion uaeos 2015Presentacion uaeos 2015
Presentacion uaeos 2015
 
KMA Insights Feb'10 Webinar: SharePoint In The Cloud Or On-Premise?
KMA Insights Feb'10 Webinar: SharePoint In The Cloud Or On-Premise?KMA Insights Feb'10 Webinar: SharePoint In The Cloud Or On-Premise?
KMA Insights Feb'10 Webinar: SharePoint In The Cloud Or On-Premise?
 
JESUS, Lider perfecto!
JESUS, Lider perfecto!  JESUS, Lider perfecto!
JESUS, Lider perfecto!
 
My first song book(vol2) disney
My first song book(vol2) disneyMy first song book(vol2) disney
My first song book(vol2) disney
 
Medicación de urgencias
Medicación de urgenciasMedicación de urgencias
Medicación de urgencias
 

Similar to Email Security Awareness

IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
Billy Warero
 
S_A_T.pptx
S_A_T.pptxS_A_T.pptx
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
Wizer - Cyber Security Awareness
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
Gihan Dias
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
Tanvir Amin
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
Alexandru Turcu
 
Online secuirty
Online secuirtyOnline secuirty
Online secuirty
Momina Mateen
 
phishing technique.pptx
phishing technique.pptxphishing technique.pptx
phishing technique.pptx
ECE6054PRIYADHARSHIN
 
Phishing
PhishingPhishing
Phishing
Syeda Javeria
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
mohmd-kutbi
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)
Dhrumit Patel
 
Cybercrime
CybercrimeCybercrime
Security awareness
Security awarenessSecurity awareness
Security awareness
Sanoop Nair
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
Namik Heydarov
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharmingDawn Hicks
 
ISDD - Security Risks
ISDD - Security RisksISDD - Security Risks
ISDD - Security Risks
Forrester High School
 
Email
EmailEmail

Similar to Email Security Awareness (20)

IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
S_A_T.pptx
S_A_T.pptxS_A_T.pptx
S_A_T.pptx
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
 
Online secuirty
Online secuirtyOnline secuirty
Online secuirty
 
phishing technique.pptx
phishing technique.pptxphishing technique.pptx
phishing technique.pptx
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Phishing
PhishingPhishing
Phishing
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharming
 
Computer 4 ict
Computer 4 ictComputer 4 ict
Computer 4 ict
 
ISDD - Security Risks
ISDD - Security RisksISDD - Security Risks
ISDD - Security Risks
 
Email
EmailEmail
Email
 

Recently uploaded

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 

Recently uploaded (20)

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 

Email Security Awareness

  • 1. { Email Security Awareness Tips to protect yourself from some common email dangers & scams
  • 2.  The driving force is MONEY!  Drive you to a site to sell you something  Scams, advanced fee, lottery  Collect personal information  Fake AV, Scareware! Ransomware!  Stealing login credentials  Key loggers  Attackers are finding ways to compromise computer, passwords, data, accounts  Easier to hack people then find way into company network through perimeter defenses Protect Yourself
  • 3.  Password may be only line of defense for email account  Don’t reuse passwords for all online accounts  Compromised password could give access to multiple accounts or sites  Avoid common words, names, birthdays  Use passphrase, mix upper and lower case letters, numbers, and special characters  Minimum 14 characters  Never keep passwords on sticky note on monitor  Login page using HTTPS required when using unsecure network (public Hot Spot)  https://www.microsoft.com/security/pc-security/password- checker.aspx Strong Passwords
  • 4.  Sense of urgency! Act now, respond now, need help  Don’t think, just click! NOW, NOW, NOW!  Alarmist messages and threats of account closures  Any email requesting personal information, bank account, credit card number, access codes, etc… (Phishing)  Spelling errors, grammatical errors  Promises of money for little or no effort  Work from home (money mule scams)  Generic greeting, Dear Customer  Request for help, related to urgency scams, emotional pull  Sender in foreign county needs help and money Tips to Avoid Scams
  • 5.  Send money up front to receive prize  Deals that sound too good to be true  Free may have a price tag!  Electronics, iPads, gift cards, lottery scams, inheritance scams etc…  Downloads and attachments  Fake software updates  Holiday scams, ecards (zip file attachment or links)  May lead to unwanted software being loaded on computer, Trojan horse program with key logger, fake AV, bot, rootkit, etc…  Senders email address  Email may claim to be from BOA, but sender address is not related to company, EX johndoe@badguysite.com Tips to Avoid Scams
  • 6.  Requests to donate to a charitable organization after a disaster that has been in the news  Shortened links, or confusing links  Redirect to bad guys site  Go directly to company web site if in doubt  Chain letters  May be collecting addresses for spammers  Unsubscribe links, may confirm live email account  Junk Mail in GroupWise  Report as spam or set up filter to block future emails (Gmail, Hotmail, Yahoo, etc…)  Similar scams may arrive as instant messages, Skype, Facebook posts, Twitter DMs  Social networking is a huge target for scams Tips to Avoid Scams
  • 7.  No! I don’t need cheap meds!  Not malicious  Similar to postal junk mail  Usually selling merchandise or advertisements  Link to ecommerce website  Drive customer to website selling products or offering services Spam
  • 8.  The number “419” refers to the article of the Nigerian Criminal Code dealing with fraud  Started before email as Spanish prisoner scam  Many variations,  Iraqi gold, blood diamonds, inheritance or investment scams, etc…  Advanced fee scams  Usually involve millions of dollars  Assistance is needed, transfer money to you and you earn percentage, catch is paying fees or taxes up front  Made to believe paying fees or taxes will lead to “bigger” prize! Nigerian 419 Email Scams
  • 9.  There is no big prize or reward!  Do not respond  Delete message  Junkmail, report as spam Don’t Respond
  • 10.  URGENCY! Dire need of help!  Receive email from friend or relative that is in foreign county and has been robbed  Needs money to settle bills Robbed in London
  • 11.  Call person, try to speak to person to verify their location  Never in country that email claims!  Senders email account has been hacked or accessed by unauthorized person  Bad guy sending email to all contacts in address book  Person is unaware account was hacked and “fake” emails are being sent  Person should change password to account immediately  Check for forwarding rules  Contact ISP or email provider for assistance Never Respond
  • 12.  To obtain information for the purpose of fraud or identity theft  Account may be locked or suspended  Have short time frame to verify  Problem with payment or credit card  Verify login credentials  Email account storage limits  URGRNCY pull is involved Phishing
  • 13.  Can use company logos  Copy from web site  Look and feel authentic  Links do not go to actual company website  Shortened links, bit.ly  Redirect to bad guy site  May sign name of actual employee with company  Senders email address is not related to company Phishing
  • 14.  Phishing Video  http://onguardonline.gov/media/video-0007-phishy- office Phishing
  • 15.  More specific  Targeted audience  Directed at specific company, people at certain levels in company or in certain departments Spear Phishing
  • 16.  The name is derived from SMS Phishing, SMS (Short Message Service) is the technology used for text messages on cell phones  URGENCY!  (Voice phISHING) it is the voice counterpart to phishing. The caller can ask for personal information or direct user to malicious website.  Support call to download “fake” software update.  Caller ID numbers and names can be spoofed. Smishing
  • 18.  Never reply to an email to verify personal information, bank account numbers, credit card numbers, passwords, etc…  Call bank or credit card company directly  Verify if they sent email  Some companies have ways to report suspected fraud emails Don’t Respond
  • 19.  Microsoft and Adobe never send updates through email  Attachments will not update programs, but load unwanted software  Links will not take to you to company web site or download attachment  Go directly to company website  Microsoft Updates through IE  Check for updates in Adobe Reader  Run PSI or Qualys Browser Check to verify updates are available Software Updates
  • 20.  Work from home scams  Make money part time, spare time  Have computer you can make thousands of dollars  Open bank account, bad guy deposits money, you transfer, or with draw money and wire it to someone, and keep percentage  No legitimate company works like this! Money Mule Scams
  • 21.  Zeus Trojan bust reveals sophisticated 'money mules' operation in U.S. (September 2010)  https://www.computerworld.com/s/article/9189038/Ze us_Trojan_bust_reveals_sophisticated_money_mules_ operation_in_U.S In the News
  • 22.  Phishing Game  http://onguardonline.gov/media/game-0011-phishing- scams  Scam and Spam Game  http://onguardonline.gov/media/game-0012-spam- scam-slam For Fun

Editor's Notes

  1. Spam email has purpose to scam or go after $$Moved past destructive element of a virus, not just about infecting computer, motivation
  2. Example of passphrasesPassword of “football” hacked in secondsPassphrase short sentence “I like to watch football”Add complexity Ilik3towatchf00tball!Use first letter from each word of sentence “For my honeymoon I went to the Bahamas and drank mud slidesFmhiwttbadmsAdd complexity Fmh1wttbAdms!!
  3. MS paying it forward, forward for good luck, virus warningsEmail address may have company name in to fool you EX payment@money.paypal2.badsite.com
  4. Social networks, scams follow the people, 800 million+ on FBGmail report as spam
  5. Open example MED.docxNote the line to Whitelist the email address to receive future offers
  6. Open 419scam.docx example
  7. Open robinlondon.docx example
  8. Hotmail, Gmail, Yahoo offer click here if friends email account has been hacked
  9. Open paypal.docx exampleOpen acountverify.docx eample
  10. Open paypal.docx exampleOpen acountverify.docx eample
  11. Open finance.docx exampleOpen gwmailbox.docx example
  12. Scams are moving to more methods of delivery
  13. I have filled out survey for Best Buyand other storesI have never given my cell phone number to surveys as contact methodWhy text message? Why not call me to notify?
  14. I have reported some phishing emails to Paypal, BOA
  15. Some updates may be bundled with internet toolbars or security checking software, browser add-ons, etc…Seen Skype updates in email as wellOpen adobe.jpg exampleOpen msupdate.jpg example
  16. Open workfromhome.jpg exampleMay also invlive buying merchandise and shipping it and keeping percentage