Phishing-Email-Fraud-General

AndrewVoorhies 356 views 15 slides Mar 12, 2016
Slide 1
Slide 1 of 15
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15

About This Presentation

No description available for this slideshow.


Slide Content

College of Knowledge Phishing email Fraud

Phishing Tackle Phishing types and channels How to recognize potential threats that email, text, and voice may deliver Identify fraudulent messages and attachments Best practices and what to do Security awareness training module introduction

Phishing Types and Streams Phishing comes through many channels Email most common (Phishing) Text message ( Smishing ) Voice message ( Vishing ) And Spear Phishing (Targeted Phishing) Fraudsters constantly finding ways to circumvent spam and email filters

What is Phishing

Phishing Holes Fraudsters look for exploits of favorite online forums such as social media Bait with a funny picture, video, or post appearing to redirect to Facebook or Twitter, which has shortened URLs to better mask the fraud Hook and Catch with a fake but VERY convincing site to obtain credentials and other details such as security questions

Talking Phish Text phishing also known as Smishing attempts to direct the user to a site to either give up credentials or worse install ransomware such as CryptoLocker Voice phishing also known as Vishing attempts to coerce the user via the phone such as to settle a false claim by phone encouraging a wire or money gram (IRS Scams)

Spear Phishing Phishing is to cast a wide net in hopes of snagging as many unsuspecting victims as possible Spear Phishing narrows the attack by targeting specific companies, individuals, or customers of a merchant IT uses the same techniques to “trick” employees to determine where more training is needed…better us than frausters

The Masquerade

Smells Phishy Many different recipients with a generic salutation used Misspelled words or poor grammar Hyperlink goes to a site different from the one shown in the email The From name doesn’t match email address Time sensitive or unusual requirements

Spot the Phish

Phishing Guides

Attached to the Phish Attachments with unauthorized actions Stealing data Hi-jacking your email contact list Locking your mobile device Use caution even from a known source No attachments can be considered safe Internal emails can also be infected Hyperlink to the internal file instead

Best Practices Be vigilant and alert when reviewing suspicious emails Think before you click When in doubt or you clicked, contact I.T. Check with the sender if unsure Do not email members’ Personally Identifiable Information (PII) Apply the same practices at home too

Security Awareness Security awareness tool and training https://cbt.rsa.com/ UID = Email PW = TBP WHOIS search engines http://www.networksolutions.com/whois/index.jsp http://www.internic.net/whois.html

Questions
Tags