/
Report Phishing Forward phishing emails to Report Phishing Forward phishing emails to

Report Phishing Forward phishing emails to - PowerPoint Presentation

phoebe-click
phoebe-click . @phoebe-click
Follow
344 views
Uploaded On 2019-12-01

Report Phishing Forward phishing emails to - PPT Presentation

Report Phishing Forward phishing emails to phishingharvardedu What is it Why phishing What can I do Phishing is the most common way attackers illegally access systems A phishing message is designed to trick you ID: 768785

click phishing file password phishing click password file account phish data messages confirm transfer delete report attackers harvard compromise

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Report Phishing Forward phishing emails ..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Report Phishing Forward phishing emails to phishing@harvard.edu

What is it? Why phishing?What can I do?

Phishing is the most common way attackers illegally access systems.

A phishing message is designed to trick you Into doing one of these four things. USERNAME ************ Click Here! Click an Unsafe Link Open an Unsafe File Type your Password Transfer Funds

Cyber attackers phish for different reasons, But they all phish.

Cyber attackers phish for different reasons, But they all phish. Intelligence Criminals Hacktivists Sensitive Data Network Access Infrastructure Money Fraud Identity Theft Public Web Pages Social Media

Phishing messages are designed to get you to react quickly without thinking too much.

Phishing messages are designed to get you to react quickly without thinking too much. Sense of Urgency Offers of Money IT Support Rewards Confirmations Odd Requests

What happens when I get a phishing email?

What happens when I get a phishing email? Click Delete Report

What happens if I click? (1/2) Password Stolen Identity Theft Data Leak Data Destruction Account Takeover

What happens if I click? (2/2) Malware Installed Stolen Password Ransomware Remote Access Network Compromise

What happens if I delete? You’re safe…

What happens if I delete? You’re safe…for now.

What happens if I report? Review Links Block Domains Check Accounts Remove Messages

If you aren’t sure… Skip the Link Ignore the File Go to The Source Click Here Please To Confirm. Or

Forward phishing emails to phishing@harvard.edu Not sure? Go to the source. In Closing:

Let’s Practice!

Rebecca Requestersen Francine Moneybags Transfer Problem Hello Francine, I am trying to get payment to a vendor. It is important they get paid by close of business. Can you please wire 7,540 to… #1 The Wire Transfer

Click Here IT Help Wendel Windowson Suspicious Activity Hello Wendel , Your computer has been infected with the RealBad2.0 Malware that you saw on the news. You must to use our scan Within 12 hours. #2 The IT Support Alert

with this form. Super Shoppers, LLC Sonia Shopper Package Damaged Dear Sonia, We apologize in advance, but your recent order was damaged in delivery. We are unable to issue a refund until you confirm Account details #3 Confirm Now!

CrazyMail Secure Reset Security@CrazyMail.Net Malia Mailer Password Compromise Dear Malia, Your account has been locked due to potential compromise. You must go to this site to secure your account. #4 Password Reset

N.Trouble@g.Harvard.edu Gary Goodegg HELP!!! HI, I need to submit this file for class but it won’t open on my computer. Can you PLEASE (!) save it as a PDF and send to me??? #5 Cry for Help

This is not my document. eFaxService@proserv.ly Sandy Scanner Your efax Premium User, Your electronic fax is attached. This file is intended only for the recipient and is considered confidential. #6 Attach And Attack