SlideShare a Scribd company logo
Security Awareness
Sanoop S | Network & Information Systems Security Architect
Email Security
Spear Phishing: Don't Trust the Links Sent by Email Messages
We noticed many of the employees receiving spear phishing / Spam content emails. This kind
of attack happens all the time. But you don’t have to be a victim.
Spear phishing is an e-mail spoofing fraud attempt that targets a specific organization, seeking
unauthorized access to confidential data.
In many cases, spear-phishing emails use attachments made to appear as legitimatedocuments
because sharing via email is a common practice among largeenterprises and government
organizations.
Phishing messages that appear to be from a bank, shop or auction, giving a link to a fake
website and asking you to follow that link and confirm your account details. Many Phishing
emails we received recently Subject like: Upgrade Email Storage, Finance Statements, LPO. The
fraudsters then use your account details to buy stuff or transfer money out of the account. These
fake sites can be hard to spot, so no reputable organization will send a message requesting your
confidential information.
 Approach links in email messages with caution
Avoid clicking a link in an email message unless you are sure of the real target address, URL, or a
valid sender. Before you click a link, make sure to read the target address. If the email message
appears to come from your bank, but the target address is just a meaningless series of numbers, do
not click the link.
 Approach images in e-mail with caution
Just as a beacon within the oceans transmits a message or data back to a source, images within
email messages —also known as “web beacons” — can be used to secretly send a message back to
the sender. Spammers rely on information returned by these images to locate active e-mail
addresses. Images can also contain harmful codes and can be used to deliver a spammer's message
in spite of filters.
 Approach attachments in email messages with caution
Attachments might be viruses or spyware that download to your machine when you open the
attachment file. If you don't know whom the attachment is from or if you weren't expecting it, DO
NOT open the attachment.
 Don't trust the sender information in an e-mail message
Even if the email message appears to come from a particular sender that you know and trust, use
the same precautions that you would use with any other email message. Spoofing is email activity in
which the sender address and other parts of the email header are altered to appear as though the
email originated or was sent from a different source. This is a common practice of spammers and is
one of the hardest to combat as there may be legitimate reasons to spoof an address.
 Don't trust offers that seem too good to be true
If a deal or offer in an email message looks too good to be true, it probably is. The best defense is to
exercise your common sense when you read and respond to email messages.
 Don't enter personal or financial information into pop-up windows
One common phishing technique is to launch a fake pop-up window when someone clicks a link in a
phishing e-mail message. To make the pop-up window look more convincing, it might be displayed
over a window you trust. Even if the pop-up window looks official or claims to be secure, avoid
entering sensitive information, because there is no way to check the security certificate.
Keep your password secret:
Email Password |Computer Login Password | Application Login Password
Employees need to understand that keeping their passwords to themselves is critical to their
companies' security, Your Company expects you to use your password to stop others misusing
your computer account. If you share your password, you may be held responsible for what other
people do with it.
For safe and Secure IT Infrastructure we implement Account Lockout Policy If any one enter
wrong password more than 5 times your computer account will be locked.
Password Expiry: You will be prompted to change password every 90 Days.
Always change your default password set by IT.

More Related Content

What's hot

Online secuirty
Online secuirtyOnline secuirty
Online secuirty
Momina Mateen
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
Namik Heydarov
 
3 pervasive phishing scams
3 pervasive phishing scams3 pervasive phishing scams
3 pervasive phishing scams
SafeSpaceOnline
 
Gone Phishing Infographic
Gone Phishing Infographic Gone Phishing Infographic
Gone Phishing Infographic
The TNS Group
 
CISA Issues Emotet Warning!
CISA Issues Emotet Warning!CISA Issues Emotet Warning!
CISA Issues Emotet Warning!
Nicole Payne
 
ACC 210 WEEK 1 DQ2
ACC 210 WEEK 1 DQ2ACC 210 WEEK 1 DQ2
ACC 210 WEEK 1 DQ2
hwguiders4po4
 
Phishing: Training Your Help Desk
Phishing: Training Your Help DeskPhishing: Training Your Help Desk
Phishing: Training Your Help Desk
Beth Sallay
 
Importance Of Email Encryption In Organizations
Importance Of Email Encryption In Organizations  Importance Of Email Encryption In Organizations
Importance Of Email Encryption In Organizations
ZixMailEncryption.com
 
Email hacking
Email hackingEmail hacking
Email hacking
ShreyaBhoje
 
How to Secure Your Outlook Account - 8 Easy Steps
How to Secure Your Outlook Account - 8 Easy StepsHow to Secure Your Outlook Account - 8 Easy Steps
How to Secure Your Outlook Account - 8 Easy Steps
Quick Heal Technologies Ltd.
 
The Difference between Pharming and Phishing
The Difference between Pharming and PhishingThe Difference between Pharming and Phishing
The Difference between Pharming and Phishing
Mason Bird
 
Security Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got MailSecurity Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got Mail
Catherine MacAllister
 
Preventions of Email Hacking
Preventions of Email HackingPreventions of Email Hacking
Preventions of Email Hacking
Usman Khan
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twins
Nilantha Piyasiri
 
Detecting disposable email addresses
Detecting disposable email addressesDetecting disposable email addresses
Detecting disposable email addresses
unRFP
 

What's hot (19)

Security provisions
Security provisions Security provisions
Security provisions
 
Online secuirty
Online secuirtyOnline secuirty
Online secuirty
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
Cel1
Cel1Cel1
Cel1
 
3 pervasive phishing scams
3 pervasive phishing scams3 pervasive phishing scams
3 pervasive phishing scams
 
Gone Phishing Infographic
Gone Phishing Infographic Gone Phishing Infographic
Gone Phishing Infographic
 
CISA Issues Emotet Warning!
CISA Issues Emotet Warning!CISA Issues Emotet Warning!
CISA Issues Emotet Warning!
 
ACC 210 WEEK 1 DQ2
ACC 210 WEEK 1 DQ2ACC 210 WEEK 1 DQ2
ACC 210 WEEK 1 DQ2
 
Phishing: Training Your Help Desk
Phishing: Training Your Help DeskPhishing: Training Your Help Desk
Phishing: Training Your Help Desk
 
Importance Of Email Encryption In Organizations
Importance Of Email Encryption In Organizations  Importance Of Email Encryption In Organizations
Importance Of Email Encryption In Organizations
 
Email hacking
Email hackingEmail hacking
Email hacking
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
How to Secure Your Outlook Account - 8 Easy Steps
How to Secure Your Outlook Account - 8 Easy StepsHow to Secure Your Outlook Account - 8 Easy Steps
How to Secure Your Outlook Account - 8 Easy Steps
 
The Difference between Pharming and Phishing
The Difference between Pharming and PhishingThe Difference between Pharming and Phishing
The Difference between Pharming and Phishing
 
Security Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got MailSecurity Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got Mail
 
Preventions of Email Hacking
Preventions of Email HackingPreventions of Email Hacking
Preventions of Email Hacking
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twins
 
Detecting disposable email addresses
Detecting disposable email addressesDetecting disposable email addresses
Detecting disposable email addresses
 
Smartphone Email Signatures
Smartphone Email SignaturesSmartphone Email Signatures
Smartphone Email Signatures
 

Viewers also liked

Sarah Scudder April 2015
Sarah Scudder April 2015Sarah Scudder April 2015
Sarah Scudder April 2015Sarah Scudder
 
PSMag_March2016_Linking Verve
PSMag_March2016_Linking VervePSMag_March2016_Linking Verve
PSMag_March2016_Linking VerveSarah Scudder
 
Opal survay 2015 final 16 may2015
Opal survay 2015 final 16 may2015Opal survay 2015 final 16 may2015
Opal survay 2015 final 16 may2015
artsig
 
Group Travel | Destination Focus | North Cyprus
Group Travel | Destination Focus | North CyprusGroup Travel | Destination Focus | North Cyprus
Group Travel | Destination Focus | North Cyprus
Ramadan Ozdemir
 
June SDG - Apex Best Practices
June SDG - Apex Best PracticesJune SDG - Apex Best Practices
June SDG - Apex Best Practices
Josep Vall-llovera
 
PROBLEMÁTICA DE LA CALIDAD DE AGUA EN ACUICULTURA AMAZÓNICA
PROBLEMÁTICA DE LA CALIDAD DE AGUA EN ACUICULTURA AMAZÓNICA PROBLEMÁTICA DE LA CALIDAD DE AGUA EN ACUICULTURA AMAZÓNICA
PROBLEMÁTICA DE LA CALIDAD DE AGUA EN ACUICULTURA AMAZÓNICA
Jules Julien Arévalo Díaz
 
September SDG - Lightning
September SDG - LightningSeptember SDG - Lightning
September SDG - Lightning
Josep Vall-llovera
 
February'16 SDG - Spring'16 new features
February'16 SDG - Spring'16 new featuresFebruary'16 SDG - Spring'16 new features
February'16 SDG - Spring'16 new features
Josep Vall-llovera
 
Marketing to Millennials: An Insider's Perspective
Marketing to Millennials: An Insider's PerspectiveMarketing to Millennials: An Insider's Perspective
Marketing to Millennials: An Insider's Perspective
Sarah Scudder
 
Proceso Productivo del Paiche
Proceso Productivo del PaicheProceso Productivo del Paiche
Proceso Productivo del Paiche
Jules Julien Arévalo Díaz
 
Which Mobile OS is the Most Secure; Apple, Android or Windows? [Updated 2016-...
Which Mobile OS is the Most Secure; Apple, Android or Windows? [Updated 2016-...Which Mobile OS is the Most Secure; Apple, Android or Windows? [Updated 2016-...
Which Mobile OS is the Most Secure; Apple, Android or Windows? [Updated 2016-...
hlittle
 
1 . introduction to communication system
1 . introduction to communication system1 . introduction to communication system
1 . introduction to communication system
abhijitjnec
 
Power poin yasmin
Power poin yasminPower poin yasmin
Power poin yasminyasmin rua
 
Clase 1 biob70
Clase 1 biob70Clase 1 biob70
Clase 1 biob70nicolasooo
 
Procesos Afectivos
Procesos AfectivosProcesos Afectivos
Procesos Afectivos
angeestrada
 
Porque papa noel no trae presentes para los ing electricistas
Porque papa noel no trae presentes para los ing electricistasPorque papa noel no trae presentes para los ing electricistas
Porque papa noel no trae presentes para los ing electricistasJose Luis
 
Sociedad de la Información y Comunicación.
Sociedad de la Información y Comunicación.Sociedad de la Información y Comunicación.
Sociedad de la Información y Comunicación.
angeestrada
 
Diamujer
DiamujerDiamujer
Diamujer
giovan2
 

Viewers also liked (20)

Sarah Scudder April 2015
Sarah Scudder April 2015Sarah Scudder April 2015
Sarah Scudder April 2015
 
PSMag_March2016_Linking Verve
PSMag_March2016_Linking VervePSMag_March2016_Linking Verve
PSMag_March2016_Linking Verve
 
Opal survay 2015 final 16 may2015
Opal survay 2015 final 16 may2015Opal survay 2015 final 16 may2015
Opal survay 2015 final 16 may2015
 
james
jamesjames
james
 
Group Travel | Destination Focus | North Cyprus
Group Travel | Destination Focus | North CyprusGroup Travel | Destination Focus | North Cyprus
Group Travel | Destination Focus | North Cyprus
 
June SDG - Apex Best Practices
June SDG - Apex Best PracticesJune SDG - Apex Best Practices
June SDG - Apex Best Practices
 
PROBLEMÁTICA DE LA CALIDAD DE AGUA EN ACUICULTURA AMAZÓNICA
PROBLEMÁTICA DE LA CALIDAD DE AGUA EN ACUICULTURA AMAZÓNICA PROBLEMÁTICA DE LA CALIDAD DE AGUA EN ACUICULTURA AMAZÓNICA
PROBLEMÁTICA DE LA CALIDAD DE AGUA EN ACUICULTURA AMAZÓNICA
 
September SDG - Lightning
September SDG - LightningSeptember SDG - Lightning
September SDG - Lightning
 
February'16 SDG - Spring'16 new features
February'16 SDG - Spring'16 new featuresFebruary'16 SDG - Spring'16 new features
February'16 SDG - Spring'16 new features
 
Marketing to Millennials: An Insider's Perspective
Marketing to Millennials: An Insider's PerspectiveMarketing to Millennials: An Insider's Perspective
Marketing to Millennials: An Insider's Perspective
 
Proceso Productivo del Paiche
Proceso Productivo del PaicheProceso Productivo del Paiche
Proceso Productivo del Paiche
 
Which Mobile OS is the Most Secure; Apple, Android or Windows? [Updated 2016-...
Which Mobile OS is the Most Secure; Apple, Android or Windows? [Updated 2016-...Which Mobile OS is the Most Secure; Apple, Android or Windows? [Updated 2016-...
Which Mobile OS is the Most Secure; Apple, Android or Windows? [Updated 2016-...
 
1 . introduction to communication system
1 . introduction to communication system1 . introduction to communication system
1 . introduction to communication system
 
Power poin yasmin
Power poin yasminPower poin yasmin
Power poin yasmin
 
Presentation1
Presentation1Presentation1
Presentation1
 
Clase 1 biob70
Clase 1 biob70Clase 1 biob70
Clase 1 biob70
 
Procesos Afectivos
Procesos AfectivosProcesos Afectivos
Procesos Afectivos
 
Porque papa noel no trae presentes para los ing electricistas
Porque papa noel no trae presentes para los ing electricistasPorque papa noel no trae presentes para los ing electricistas
Porque papa noel no trae presentes para los ing electricistas
 
Sociedad de la Información y Comunicación.
Sociedad de la Información y Comunicación.Sociedad de la Información y Comunicación.
Sociedad de la Información y Comunicación.
 
Diamujer
DiamujerDiamujer
Diamujer
 

Similar to Security awareness

IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
Billy Warero
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
Tanvir Amin
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked inPayza
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
ssuser64f8f8
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
Wizer - Cyber Security Awareness
 
S_A_T.pptx
S_A_T.pptxS_A_T.pptx
A Deep Dive into Phishing Techniques and Countermeasures.pdf
A Deep Dive into Phishing Techniques and Countermeasures.pdfA Deep Dive into Phishing Techniques and Countermeasures.pdf
A Deep Dive into Phishing Techniques and Countermeasures.pdf
watchyourpocketbusin
 
Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You?
The TNS Group
 
Email
EmailEmail
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
NetLockSmith
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
amby3
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
vdgtkhdh
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
Alexandru Turcu
 
Phishing & Cyber Attack Awareness
Phishing & Cyber Attack AwarenessPhishing & Cyber Attack Awareness
Phishing & Cyber Attack Awareness
Kittelson & Carpo Consulting
 
How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?
Ankush Sarkar
 
Phishing
PhishingPhishing
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigation
NimishaRawat
 
Keeping Your Email Secure
Keeping Your Email SecureKeeping Your Email Secure
Keeping Your Email Secure
Texas Medical Liability Trust
 

Similar to Security awareness (20)

IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 
S_A_T.pptx
S_A_T.pptxS_A_T.pptx
S_A_T.pptx
 
A Deep Dive into Phishing Techniques and Countermeasures.pdf
A Deep Dive into Phishing Techniques and Countermeasures.pdfA Deep Dive into Phishing Techniques and Countermeasures.pdf
A Deep Dive into Phishing Techniques and Countermeasures.pdf
 
Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You?
 
Email
EmailEmail
Email
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
Safe Email Practices
Safe Email PracticesSafe Email Practices
Safe Email Practices
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
 
Phishing & Cyber Attack Awareness
Phishing & Cyber Attack AwarenessPhishing & Cyber Attack Awareness
Phishing & Cyber Attack Awareness
 
How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?
 
Phishing
PhishingPhishing
Phishing
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigation
 
Keeping Your Email Secure
Keeping Your Email SecureKeeping Your Email Secure
Keeping Your Email Secure
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 

Recently uploaded

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 

Recently uploaded (20)

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 

Security awareness

  • 1. Security Awareness Sanoop S | Network & Information Systems Security Architect Email Security Spear Phishing: Don't Trust the Links Sent by Email Messages We noticed many of the employees receiving spear phishing / Spam content emails. This kind of attack happens all the time. But you don’t have to be a victim. Spear phishing is an e-mail spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data. In many cases, spear-phishing emails use attachments made to appear as legitimatedocuments because sharing via email is a common practice among largeenterprises and government organizations. Phishing messages that appear to be from a bank, shop or auction, giving a link to a fake website and asking you to follow that link and confirm your account details. Many Phishing emails we received recently Subject like: Upgrade Email Storage, Finance Statements, LPO. The fraudsters then use your account details to buy stuff or transfer money out of the account. These fake sites can be hard to spot, so no reputable organization will send a message requesting your confidential information.  Approach links in email messages with caution Avoid clicking a link in an email message unless you are sure of the real target address, URL, or a valid sender. Before you click a link, make sure to read the target address. If the email message appears to come from your bank, but the target address is just a meaningless series of numbers, do not click the link.  Approach images in e-mail with caution Just as a beacon within the oceans transmits a message or data back to a source, images within email messages —also known as “web beacons” — can be used to secretly send a message back to the sender. Spammers rely on information returned by these images to locate active e-mail
  • 2. addresses. Images can also contain harmful codes and can be used to deliver a spammer's message in spite of filters.  Approach attachments in email messages with caution Attachments might be viruses or spyware that download to your machine when you open the attachment file. If you don't know whom the attachment is from or if you weren't expecting it, DO NOT open the attachment.  Don't trust the sender information in an e-mail message Even if the email message appears to come from a particular sender that you know and trust, use the same precautions that you would use with any other email message. Spoofing is email activity in which the sender address and other parts of the email header are altered to appear as though the email originated or was sent from a different source. This is a common practice of spammers and is one of the hardest to combat as there may be legitimate reasons to spoof an address.  Don't trust offers that seem too good to be true If a deal or offer in an email message looks too good to be true, it probably is. The best defense is to exercise your common sense when you read and respond to email messages.  Don't enter personal or financial information into pop-up windows One common phishing technique is to launch a fake pop-up window when someone clicks a link in a phishing e-mail message. To make the pop-up window look more convincing, it might be displayed over a window you trust. Even if the pop-up window looks official or claims to be secure, avoid entering sensitive information, because there is no way to check the security certificate. Keep your password secret:
  • 3. Email Password |Computer Login Password | Application Login Password Employees need to understand that keeping their passwords to themselves is critical to their companies' security, Your Company expects you to use your password to stop others misusing your computer account. If you share your password, you may be held responsible for what other people do with it. For safe and Secure IT Infrastructure we implement Account Lockout Policy If any one enter wrong password more than 5 times your computer account will be locked. Password Expiry: You will be prompted to change password every 90 Days. Always change your default password set by IT.