SlideShare a Scribd company logo
#1 Trusted Boat
What is Phishing?
Phishing is a fraud method where the hacker sends out emails, usually from a known
contact or company, in an attempt to gather personal and financial information from the
recipient.
GONE PHISHING
Top 5 Causes of Data Breaches
1 THEFT OR LOSS
HACKERS
ACCIDENTAL INFO LEAK
FRAUD
INSIDER THEFT
2
3
4
5
Signs of a Phishing Attack
Messages from an unknown sender
Unclear or mislabeled links
Messages with typos
Unexpected or non-business related messages
Messages asking for private info
Messages from a superior asking for an unusual
request
Tips to Avoid the Hook
Don't give away any personal information. Most businesses won't request a
username and password via email.
Be alert for unexpected emails that request an immediate action, such as
clicking a link or downloading a document.
If you are unsure of the legitimacy of an email call the contact or company
directly to verify.
Make sure your anti-virus software is up to date.
www.thetnsgroup.com - 203.316.0112
Is your company's data safe from phishing attempts? Are all of your employees
equipped to identify phishing emails? Your data is only safe if every employee is
properly trained to spot phishing attempts.
Contact The TNS Group today to discuss phish testing
and don't leave the fate of your company's data
to "common sense".
Security Awareness Training

More Related Content

What's hot

Cyber Crime
Cyber CrimeCyber Crime
Id Theft & Phishing2
Id Theft & Phishing2Id Theft & Phishing2
Id Theft & Phishing2
Jeffavery99
 
Id Theft & Phishing2
Id Theft & Phishing2Id Theft & Phishing2
Id Theft & Phishing2
Jeffavery9
 
The Difference between Pharming and Phishing
The Difference between Pharming and PhishingThe Difference between Pharming and Phishing
The Difference between Pharming and Phishing
Mason Bird
 
Spear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaSpear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishna
Raghunath G
 
Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You?
The TNS Group
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
Billy Warero
 
11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers
seema Vishwakarma
 
Phishing
PhishingPhishing
Phishing technology
Phishing technologyPhishing technology
Phishing technology
Preeti Papneja
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharming
Dawn Hicks
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
Lisa Sosebee
 
Phishing, Pharming, Clickjacking
Phishing, Pharming, ClickjackingPhishing, Pharming, Clickjacking
Phishing, Pharming, Clickjacking
Ashley_Coy
 
Phishing
PhishingPhishing
Phishing
Basil Alothman
 
Identity theft
Identity theftIdentity theft
Identity theft
SARASWATHI S
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Rakesh Sahani
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6
krupp
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
Angela Lawson
 
Antiphishing
AntiphishingAntiphishing
Antiphishing
Justin Eldredge
 
Lottery scam
Lottery scamLottery scam
Lottery scam
BrijeshR3
 

What's hot (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Id Theft & Phishing2
Id Theft & Phishing2Id Theft & Phishing2
Id Theft & Phishing2
 
Id Theft & Phishing2
Id Theft & Phishing2Id Theft & Phishing2
Id Theft & Phishing2
 
The Difference between Pharming and Phishing
The Difference between Pharming and PhishingThe Difference between Pharming and Phishing
The Difference between Pharming and Phishing
 
Spear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaSpear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishna
 
Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You?
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers
 
Phishing
PhishingPhishing
Phishing
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharming
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Phishing, Pharming, Clickjacking
Phishing, Pharming, ClickjackingPhishing, Pharming, Clickjacking
Phishing, Pharming, Clickjacking
 
Phishing
PhishingPhishing
Phishing
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Antiphishing
AntiphishingAntiphishing
Antiphishing
 
Lottery scam
Lottery scamLottery scam
Lottery scam
 

Similar to Gone Phishing Infographic

IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
Tanvir Amin
 
Phishing & Cyber Attack Awareness
Phishing & Cyber Attack AwarenessPhishing & Cyber Attack Awareness
Phishing & Cyber Attack Awareness
Kittelson & Carpo Consulting
 
RP Phishing Awareness
RP Phishing Awareness RP Phishing Awareness
RP Phishing Awareness
Marketing Ruhrpumpen
 
Phishing email PDF Flyer
Phishing email PDF FlyerPhishing email PDF Flyer
Phishing email PDF Flyer
Jim Piechocki
 
Phishing mails: Bonnes pratiques
Phishing mails: Bonnes pratiques Phishing mails: Bonnes pratiques
Phishing mails: Bonnes pratiques
EyesOpen Association
 
A Deep Dive into Phishing Techniques and Countermeasures.pdf
A Deep Dive into Phishing Techniques and Countermeasures.pdfA Deep Dive into Phishing Techniques and Countermeasures.pdf
A Deep Dive into Phishing Techniques and Countermeasures.pdf
watchyourpocketbusin
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
Preeti Papneja
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
Preeti Papneja
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
ssuser64f8f8
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
sonalikharade3
 
Security awareness
Security awarenessSecurity awareness
Security awareness
Sanoop Nair
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
Payza
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
NetLockSmith
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
MaherHamza9
 
Spear Phishing 101
Spear Phishing 101Spear Phishing 101
Spear Phishing 101
Sendio
 
Internet Phishing
Internet Phishing�Internet Phishing�
Internet Phishing
master slave
 
Phishing
PhishingPhishing
2016 Social Engineering Training
2016 Social Engineering Training2016 Social Engineering Training
2016 Social Engineering Training
Rob Valdez
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
amby3
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Okan YILDIZ
 

Similar to Gone Phishing Infographic (20)

IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Phishing & Cyber Attack Awareness
Phishing & Cyber Attack AwarenessPhishing & Cyber Attack Awareness
Phishing & Cyber Attack Awareness
 
RP Phishing Awareness
RP Phishing Awareness RP Phishing Awareness
RP Phishing Awareness
 
Phishing email PDF Flyer
Phishing email PDF FlyerPhishing email PDF Flyer
Phishing email PDF Flyer
 
Phishing mails: Bonnes pratiques
Phishing mails: Bonnes pratiques Phishing mails: Bonnes pratiques
Phishing mails: Bonnes pratiques
 
A Deep Dive into Phishing Techniques and Countermeasures.pdf
A Deep Dive into Phishing Techniques and Countermeasures.pdfA Deep Dive into Phishing Techniques and Countermeasures.pdf
A Deep Dive into Phishing Techniques and Countermeasures.pdf
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
 
Spear Phishing 101
Spear Phishing 101Spear Phishing 101
Spear Phishing 101
 
Internet Phishing
Internet Phishing�Internet Phishing�
Internet Phishing
 
Phishing
PhishingPhishing
Phishing
 
2016 Social Engineering Training
2016 Social Engineering Training2016 Social Engineering Training
2016 Social Engineering Training
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
 

Recently uploaded

Breaking Silos To Break Bank: Shattering The Divide Between Search And Social
Breaking Silos To Break Bank: Shattering The Divide Between Search And SocialBreaking Silos To Break Bank: Shattering The Divide Between Search And Social
Breaking Silos To Break Bank: Shattering The Divide Between Search And Social
Navah Hopkins
 
Story Telling Master Class - Jennifer Morilla
Story Telling Master Class - Jennifer MorillaStory Telling Master Class - Jennifer Morilla
Embark on style journeys Indian clothing store denver guide.pptx
Embark on style journeys Indian clothing store denver guide.pptxEmbark on style journeys Indian clothing store denver guide.pptx
Embark on style journeys Indian clothing store denver guide.pptx
Omnama Fashions
 
Lily Ray - Optimize the Forest, Not the Trees: Move Beyond SEO Checklist - Mo...
Lily Ray - Optimize the Forest, Not the Trees: Move Beyond SEO Checklist - Mo...Lily Ray - Optimize the Forest, Not the Trees: Move Beyond SEO Checklist - Mo...
Lily Ray - Optimize the Forest, Not the Trees: Move Beyond SEO Checklist - Mo...
Amsive
 
Boost Your Instagram Views Instantly Proven Free Strategies.pptx
Boost Your Instagram Views Instantly Proven Free Strategies.pptxBoost Your Instagram Views Instantly Proven Free Strategies.pptx
Boost Your Instagram Views Instantly Proven Free Strategies.pptx
InstBlast Marketing
 
How to Kickstart Content Marketing With A Small Team - Dennis Shiao
How to Kickstart Content Marketing With A Small Team - Dennis ShiaoHow to Kickstart Content Marketing With A Small Team - Dennis Shiao
How to Kickstart Content Marketing With A Small Team - Dennis Shiao
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
THE STORY COMMUNICATION Credential 2024.pptx
THE STORY COMMUNICATION Credential 2024.pptxTHE STORY COMMUNICATION Credential 2024.pptx
THE STORY COMMUNICATION Credential 2024.pptx
huyenngo62
 
Growth Marketing in 2024 - Randy Rayess, Outgrow
Growth Marketing in 2024 - Randy Rayess,  OutgrowGrowth Marketing in 2024 - Randy Rayess,  Outgrow
How to Maximize Sales Using Social Commerce
How to Maximize Sales Using Social CommerceHow to Maximize Sales Using Social Commerce
How to Maximize Sales Using Social Commerce
Vbout.com
 
PickUp_conversational AI_Capex, Inc._20240611
PickUp_conversational AI_Capex, Inc._20240611PickUp_conversational AI_Capex, Inc._20240611
PickUp_conversational AI_Capex, Inc._20240611
Shuntaro Kogame
 
2025 Adventur ehomes Product Guide released Jun 1 2024
2025 Adventur ehomes Product Guide released Jun 1 20242025 Adventur ehomes Product Guide released Jun 1 2024
2025 Adventur ehomes Product Guide released Jun 1 2024
JimWilliams206540
 
Get Off the Bandwagon - Separating Digital Marketing Myths from Truth - Scott...
Get Off the Bandwagon - Separating Digital Marketing Myths from Truth - Scott...Get Off the Bandwagon - Separating Digital Marketing Myths from Truth - Scott...
Get Off the Bandwagon - Separating Digital Marketing Myths from Truth - Scott...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Content Marketing Blueprint For Content Strategy, content creation, content d...
Content Marketing Blueprint For Content Strategy, content creation, content d...Content Marketing Blueprint For Content Strategy, content creation, content d...
Content Marketing Blueprint For Content Strategy, content creation, content d...
Bertie Birchfield
 
Pillar-Based Marketing Master Class - Ryan Brock
Pillar-Based Marketing Master Class - Ryan BrockPillar-Based Marketing Master Class - Ryan Brock
DCC Technology Intro Slides June 2024.pptx
DCC Technology Intro Slides June 2024.pptxDCC Technology Intro Slides June 2024.pptx
DCC Technology Intro Slides June 2024.pptx
vishc81
 
Get admission in various courses and boost your employment opportunities.
Get admission in various courses and boost your employment opportunities.Get admission in various courses and boost your employment opportunities.
Get admission in various courses and boost your employment opportunities.
complete knowledge
 
Basic Management Concepts., “Management is the art of getting things done thr...
Basic Management Concepts., “Management is the art of getting things done thr...Basic Management Concepts., “Management is the art of getting things done thr...
Basic Management Concepts., “Management is the art of getting things done thr...
DilanThennakoon
 
Practical Progress from a Theory by Steven Kingpdf
Practical Progress from a Theory by Steven KingpdfPractical Progress from a Theory by Steven Kingpdf
Practical Progress from a Theory by Steven Kingpdf
william charnock
 
How to Make Your Trade Show Booth Stand Out
How to Make Your Trade Show Booth Stand OutHow to Make Your Trade Show Booth Stand Out
How to Make Your Trade Show Booth Stand Out
Blue Atlas Marketing
 

Recently uploaded (20)

Breaking Silos To Break Bank: Shattering The Divide Between Search And Social
Breaking Silos To Break Bank: Shattering The Divide Between Search And SocialBreaking Silos To Break Bank: Shattering The Divide Between Search And Social
Breaking Silos To Break Bank: Shattering The Divide Between Search And Social
 
Story Telling Master Class - Jennifer Morilla
Story Telling Master Class - Jennifer MorillaStory Telling Master Class - Jennifer Morilla
Story Telling Master Class - Jennifer Morilla
 
Embark on style journeys Indian clothing store denver guide.pptx
Embark on style journeys Indian clothing store denver guide.pptxEmbark on style journeys Indian clothing store denver guide.pptx
Embark on style journeys Indian clothing store denver guide.pptx
 
Lily Ray - Optimize the Forest, Not the Trees: Move Beyond SEO Checklist - Mo...
Lily Ray - Optimize the Forest, Not the Trees: Move Beyond SEO Checklist - Mo...Lily Ray - Optimize the Forest, Not the Trees: Move Beyond SEO Checklist - Mo...
Lily Ray - Optimize the Forest, Not the Trees: Move Beyond SEO Checklist - Mo...
 
Boost Your Instagram Views Instantly Proven Free Strategies.pptx
Boost Your Instagram Views Instantly Proven Free Strategies.pptxBoost Your Instagram Views Instantly Proven Free Strategies.pptx
Boost Your Instagram Views Instantly Proven Free Strategies.pptx
 
How to Kickstart Content Marketing With A Small Team - Dennis Shiao
How to Kickstart Content Marketing With A Small Team - Dennis ShiaoHow to Kickstart Content Marketing With A Small Team - Dennis Shiao
How to Kickstart Content Marketing With A Small Team - Dennis Shiao
 
THE STORY COMMUNICATION Credential 2024.pptx
THE STORY COMMUNICATION Credential 2024.pptxTHE STORY COMMUNICATION Credential 2024.pptx
THE STORY COMMUNICATION Credential 2024.pptx
 
Growth Marketing in 2024 - Randy Rayess, Outgrow
Growth Marketing in 2024 - Randy Rayess,  OutgrowGrowth Marketing in 2024 - Randy Rayess,  Outgrow
Growth Marketing in 2024 - Randy Rayess, Outgrow
 
How to Maximize Sales Using Social Commerce
How to Maximize Sales Using Social CommerceHow to Maximize Sales Using Social Commerce
How to Maximize Sales Using Social Commerce
 
PickUp_conversational AI_Capex, Inc._20240611
PickUp_conversational AI_Capex, Inc._20240611PickUp_conversational AI_Capex, Inc._20240611
PickUp_conversational AI_Capex, Inc._20240611
 
2025 Adventur ehomes Product Guide released Jun 1 2024
2025 Adventur ehomes Product Guide released Jun 1 20242025 Adventur ehomes Product Guide released Jun 1 2024
2025 Adventur ehomes Product Guide released Jun 1 2024
 
Get Off the Bandwagon - Separating Digital Marketing Myths from Truth - Scott...
Get Off the Bandwagon - Separating Digital Marketing Myths from Truth - Scott...Get Off the Bandwagon - Separating Digital Marketing Myths from Truth - Scott...
Get Off the Bandwagon - Separating Digital Marketing Myths from Truth - Scott...
 
Content Marketing Blueprint For Content Strategy, content creation, content d...
Content Marketing Blueprint For Content Strategy, content creation, content d...Content Marketing Blueprint For Content Strategy, content creation, content d...
Content Marketing Blueprint For Content Strategy, content creation, content d...
 
Pillar-Based Marketing Master Class - Ryan Brock
Pillar-Based Marketing Master Class - Ryan BrockPillar-Based Marketing Master Class - Ryan Brock
Pillar-Based Marketing Master Class - Ryan Brock
 
DCC Technology Intro Slides June 2024.pptx
DCC Technology Intro Slides June 2024.pptxDCC Technology Intro Slides June 2024.pptx
DCC Technology Intro Slides June 2024.pptx
 
Get admission in various courses and boost your employment opportunities.
Get admission in various courses and boost your employment opportunities.Get admission in various courses and boost your employment opportunities.
Get admission in various courses and boost your employment opportunities.
 
Basic Management Concepts., “Management is the art of getting things done thr...
Basic Management Concepts., “Management is the art of getting things done thr...Basic Management Concepts., “Management is the art of getting things done thr...
Basic Management Concepts., “Management is the art of getting things done thr...
 
Practical Progress from a Theory by Steven Kingpdf
Practical Progress from a Theory by Steven KingpdfPractical Progress from a Theory by Steven Kingpdf
Practical Progress from a Theory by Steven Kingpdf
 
How to Make Your Trade Show Booth Stand Out
How to Make Your Trade Show Booth Stand OutHow to Make Your Trade Show Booth Stand Out
How to Make Your Trade Show Booth Stand Out
 
Unleash the Power of Storytelling - Win Hearts, Change Minds, Get Results - R...
Unleash the Power of Storytelling - Win Hearts, Change Minds, Get Results - R...Unleash the Power of Storytelling - Win Hearts, Change Minds, Get Results - R...
Unleash the Power of Storytelling - Win Hearts, Change Minds, Get Results - R...
 

Gone Phishing Infographic

  • 1. #1 Trusted Boat What is Phishing? Phishing is a fraud method where the hacker sends out emails, usually from a known contact or company, in an attempt to gather personal and financial information from the recipient. GONE PHISHING Top 5 Causes of Data Breaches 1 THEFT OR LOSS HACKERS ACCIDENTAL INFO LEAK FRAUD INSIDER THEFT 2 3 4 5 Signs of a Phishing Attack Messages from an unknown sender Unclear or mislabeled links Messages with typos Unexpected or non-business related messages Messages asking for private info Messages from a superior asking for an unusual request Tips to Avoid the Hook Don't give away any personal information. Most businesses won't request a username and password via email. Be alert for unexpected emails that request an immediate action, such as clicking a link or downloading a document. If you are unsure of the legitimacy of an email call the contact or company directly to verify. Make sure your anti-virus software is up to date. www.thetnsgroup.com - 203.316.0112 Is your company's data safe from phishing attempts? Are all of your employees equipped to identify phishing emails? Your data is only safe if every employee is properly trained to spot phishing attempts. Contact The TNS Group today to discuss phish testing and don't leave the fate of your company's data to "common sense". Security Awareness Training