A Matter of Your Personal Security Phishing. Beware of Phishing Emails Several employees received an email that looked legitimate, as if it was being.

Slides:



Advertisements
Similar presentations
You are responsible for security of your internet banking transactions ONLINE.
Advertisements

What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
June is an easy way to communicate. It costs nothing to send an , but it does require a connection to the Internet. You can.
HUNTINGTON BEACH PUBLIC LIBRARY Basics. What is ? short for electronic mail send & receive messages over the internet.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Quiz Review.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Threats to I.T Internet security By Cameron Mundy.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
Reliability & Desirability of Data
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Your MyDC Account and . From the Darton homepage at Click on the MyDC link.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
Phishing: Trends and Countermeasures Blaine Wilson.
How to Read Outlook . Make sure the computer is on.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Phishing Dennis Schmidt, CISSP Director, Office of Information Systems HIPAA Security Officer UNC School of Medicine UNC School of Medicine.
A Matter of Your Personal Security Phishing Revised 11/30/15.
This Guide is going to be about how to  attach files  create a signature  send to multiple recipients with using ‘Cc’ and ‘Bcc’  change the priority.
October is National CyberSecurity Awareness Month OIT and IT providers across campus are launching an awareness campaign to provide tips and resources.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
Take the Quiz and find out more!
Important Information Provided by Information Technology Center
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Media education: from passive consumers to active creators
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Learn how to protect yourself against common attacks
Don’t get phished!, recognize the bait
Lesson 3 Safe Computing.
is short for electronic mail!
Phishing, what you should know
What to be aware of and how to avoid problems.
Information Security 101 Richard Davis, Rob Laltrello.
Staying Austin College
Electronic Mail.
Town of Vernon & Vernon Board of Education
An Overview.
Electronic Mail.
Electronic Mail Opening Activity: 411 of
Electronic Mail.
9 ways to avoid viruses and spyware
Electronic Mail.
What is Phishing? Pronounced “Fishing”
Presentation transcript:

A Matter of Your Personal Security Phishing

Beware of Phishing s Several employees received an that looked legitimate, as if it was being sent directly from Christiana Care. Those employees clicked on the link within the , which unintentionally gave the hacker their network login information. Consequently, the hacker was able to access their Workday account and change their direct deposit information. As a result, their bi-weekly pay was directed to the bogus bank account. Don’t let this happen to you! Listen to what happened to several of your colleagues:

What is “Phishing?” An attempt to acquire sensitive information such as usernames, passwords, and credit card/bank account details, often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.” -Wikipedia

How do I know if it’s a phishing ? Common characteristics of phishing s: Addressed to a generic or group recipient Appear to be sent from someone known to the receiver or a trusted organization (i.e. CCHS) Convey a sense of urgency, prompting the receiver for immediate action Contain blank To: or Cc: fields Subject line is uninformative and/or doesn’t reflect the content Signature is often vague or generic Prompts you for a username and/or password, or other sensitive information Occasionally includes misspelled words, grammatical errors, or other confusing information

Do’s and Don’ts of Phishing s Click on an unfamiliar link or open an attachment in an from an unknown or untrusted source Provide anyone with your username, password, or any other sensitive account information, even if the message appears to be coming from CCHS Enter private or personal information in a popup window Enter private information on a website without first checking for in the URL and a lock icon DON’T

Do’s and Don’ts of Phishing s Use caution when opening unsolicited messages. Pay special attention to the name of the website. Often times they look very similar and only deviate by 1-3 letters. For example: vs. Hover your mouse pointer over the embedded link, or retype the address in a new browser, to see if it is taking you to where it claims to be. Check the sender’s address to make sure you know the person/organization that sent the message. Review the subject line of the message for suspicious/strange language, or directions to open an attachment or click a link. Report suspicious activity as junk by clicking the “Junk” button on your Outlook toolbar. Use caution when checking your on a mobile device. Consider changing your other passwords (i.e. to your personal accounts) DO

When in doubt… Consider deleting a message if it contains a link or an attachment that you weren't expecting to receive. Be sure that you delete the message without opening the attachment. CCHS will NEVER ask you for your 801# or password for any reason, especially via . Report suspicious activity as junk by clicking the “Junk” button on your Outlook toolbar. Contact the IT Customer Service Center.

What Does This Mean To You? If a hacker has access to your username and password, he also has access to your personal information AND your work information, such as: Date of birth Social Security Number Benefit information Bank account numbers Tax documents Work CCHS systems (i.e. Powerchart) Having access to this sensitive information could put your personal identity and our patients at risk.

This is Phishy! Conveys a sense of urgency Appears to be sent from someone known to the receiver or a trusted organization Signature is vague or generic Prompts to change account information

This is Phishy! Actual link Addressed to a generic group or recipient Conveys a sense of urgency