0% found this document useful (0 votes)
14 views11 pages

Phising Awareness Program

The document outlines a phishing awareness program aimed at educating users on recognizing and responding to phishing attacks. It details various types of phishing, signs to identify phishing attempts, and guidelines for reporting such incidents. The key takeaway emphasizes the importance of vigilance and proactive reporting to enhance cybersecurity awareness.

Uploaded by

victor molina
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views11 pages

Phising Awareness Program

The document outlines a phishing awareness program aimed at educating users on recognizing and responding to phishing attacks. It details various types of phishing, signs to identify phishing attempts, and guidelines for reporting such incidents. The key takeaway emphasizes the importance of vigilance and proactive reporting to enhance cybersecurity awareness.

Uploaded by

victor molina
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

PHISING

AWARENESS Educating Users on Recognizing and


PROGRAM Responding to Phishing Attacks

EJOKE JOHN
INTRODUCTION
OBJECTIVE:

THE PURPOSE OF THIS AWARENESS


PROGRAM IS TO:

Educate users about the Teach users how to Provide guidelines on how
nature and impact of recognize common signs to respond to suspected
phishing attacks. of phishing attempts. phishing emails.

Establish a reporting
Increase overall
mechanism for users to
awareness and vigilance
report suspected phishing
towards phishing threats.
attempts.
TYPES OF PHYSING

WHAT IS PHISING? Mail Phishing is a form of


phishing where attackers
Spear Phishing is a
targeted form of phishing
send emails that appear to aimed at specific
be from legitimate sources, individuals or organizations,
asking recipients to click on often using personalized
a link or download an information to increase
Phishing is a cyber attack where attackers deceive attachment. credibility.
individuals into providing sensitive information by
pretending to be trustworthy entities. This is usually done
through fraudulent emails, messages, or websites. Example: An email claiming Example: An email addressed
to be from your bank asking to an employee, asking them to
for account verification. approve an invoice

Vishing is phishing conducted Whaling is a type of spear Smishing is phishing conducted


through voice calls, where phishing that targets high- through SMS or text messages,
attackers impersonate legitimate profile individuals such as where attackers send messages
entities and try to deceive executives or key decision- that appear to be from legitimate
individuals into providing makers within an organization. sources.
sensitive information.

Example: An email purportedly Example: A text message from a


Example: A phone call from "your from the CEO, asking for urgent mobile carrier asking for account
bank" asking for account details. fund transfer. updates.
Email Phishing Smishing

Vishing

Whaling
Spear Phishing
Suspicious links

Unusual sender
Fake websites
addresses

HOW TO Suspicious pop-


ups
Urgent language

RECOGNIZE
PHISHING Too good to be Unexpected

ATTEMPTS
true offers attachments

Unusual Generic
requests greetings
Misspellings &
grammar errors
Real-world examples of phishing emails
Understanding their tactics
Here’s a breakdown of the phishing red flags in the real-world
example from "Neil Harvey" as mentioned earlier

Generic Sender Unverified Context Suspicious Link The Unsolicited Account


Name: "Neil The context provided link included () could Information: Sharing
Harvey" might be lacks credibility—why lead to a fraudulent account details and a
unfamiliar or was this message sent, website aiming to password through an email
unrelated, creating and by whom? steal sensitive is highly unusual and
suspicion. information. unprofessional.

Excessive Financial Request for Secrecy: Missing Professional Unusual Urgency: This
Amount: Mention of a Advising to "keep your Details: No official prompts immediate
significant sum (e.g., password safe" falsely branding, contact action without providing
3,445,147.00 USDT) is establishes trust while information, or verification channels.
bait to create masking malicious intent. affiliation is
excitement or mentioned.
urgency.
How to Verify the Sender: Check the Scan for Malware: Run a
Respond to a sender's email address
carefully for inconsistencies or
quick antivirus or anti-
malware scan to ensure
Phishing misspellings. If the email claims
to be from a company, contact
your device hasn’t already
been compromised.
Attempts them directly through their
official website or phone
number to confirm its
legitimacy.

Do Not Engage: Never reply to Report the Email: Delete the Email: Educate Others: Share
the sender or click on any links Most email providers have a Once reported, the experience with
in the email. Interacting with the "Report Phishing" or "Mark delete the email colleagues, friends, or
email can confirm to the as Spam" option. immediately to avoid family to help them
scammer that your email accidentally avoid falling for similar
address is active. interacting with it in scams.
the future.
Summary
Phishing Email Signs: Real-World Example Analysis: Responding to Phishing Emails:
Look out for suspicious links, In the example provided (e.g., Do not engage with the email or
generic greetings, urgent financial management email), key click on links.
language, unfamiliar senders, and phishing indicators include
grammatical errors. excessive financial amounts, Report phishing emails through your
Be cautious of unsolicited unverified context, suspicious links, email provider or to local
account details or requests for and a lack of professional branding. authorities.
sensitive information
Delete the email and scan your
device for malware.

Reporting Phishing Emails:


•Use the "Report Phishing" option
in your email service or forward it
to the appropriate authority (e.g.,
[email protected]).

•Notify your organization if it’s


work-related and delete the email
afterward.
Key Takeaway

Stay vigilant, verify unfamiliar communication, and take action to report


phishing attempts to protect yourself and others from falling victim to scams.

Cybersecurity is all about awareness and caution!


Thank You

• Thank you all for your attention and active


participation today. Your engagement and
insights have been truly valuable, and it’s been
a pleasure sharing this session with you.
Together, we’ve made significant strides in
understanding and addressing key aspects of
cybersecurity.

• Let’s continue to stay vigilant and spread


awareness in this ever-evolving digital
landscape. Once again, thank you for your
time and involvement!

You might also like