+ All Categories
Home > Technology > 2016 Social Engineering Training

2016 Social Engineering Training

Date post: 14-Apr-2017
Category:
Upload: rob-valdez-cpa-cisa
View: 68 times
Download: 0 times
Share this document with a friend
18
The following is for your education, so please continue through this exercise. You will learn about the risks of phishing and some common traits to help identify phishing attacks. Please read each slide carefully and completely. The link you clicked on was part of a phishing awareness campaign.
Transcript
Page 1: 2016 Social Engineering Training

The following is for your education, so please continue through this exercise. You will learn about the risks of phishing and some common traits to help identify phishing attacks. Please read each slide carefully and completely.

The link you clicked on was part of a phishing awareness campaign.

Page 2: 2016 Social Engineering Training

What is Phishing?( hint: it’s tricking an end user via a fake email! )

Page 3: 2016 Social Engineering Training

“Phishing” refers to fake emails sent by attackers. If they can get one person to click on a link or download an attachment, they

can gain access.

Page 4: 2016 Social Engineering Training

Phishing Emails Work

50%open emails and click on phishing links within the

first hour

11%click on

attachments

Page 5: 2016 Social Engineering Training

Source: 2016 Verizon Data Breach Investigations Report

89%

Most phishing is done by organized crime syndicates.

Page 6: 2016 Social Engineering Training

85% of targeted attacks use spear-phishing emails.

Page 7: 2016 Social Engineering Training

What can be done?

Improved e-mail filtering (technology)

Human sensor network(YOU!)

A NETWORK OF HUMAN SENSORS ARE MORE EFFECTIVE AT DETECTING PHISHING ATTACKS THAN ALMOST ANY TECHNOLOGY

Source: 2015 Verizon Data Breach Investigations Report

Page 8: 2016 Social Engineering Training

Phishing in the News

Page 9: 2016 Social Engineering Training

Phishing in the News

A single victim of a phishing attack can impact on millions.

Page 10: 2016 Social Engineering Training

Phishing AttacksLook Real

Page 11: 2016 Social Engineering Training

Phishing AttacksLook Real

Page 12: 2016 Social Engineering Training

Phishing AttacksLook Real

Page 13: 2016 Social Engineering Training

What can you do?

Know the signs of a phishing

attack

Report phishing attacks to the IT

Department

Page 14: 2016 Social Engineering Training

How to detect a Phishing email

Page 15: 2016 Social Engineering Training

Common Phishing Traits

1

2

3

4

5

6

1. Generic greeting2. Invokes fear3. Requires action4. Threatening language5. Grammar issues6. Generic closing

Page 16: 2016 Social Engineering Training

DO NOT click on unknown links

DO NOT reply to suspicious requests

DO hover over links verify its location

DO report the suspected attack

What to do?

Page 17: 2016 Social Engineering Training

What to do?

DO Be suspicious of unsolicited attachments.DO Confirm information through other channels of communication. That is, contact the sender on a known line, email, website, or other method.

DO NOT give information in the email.DO NOT download any files.DO NOT rely on the “from” and “reply to” email addresses, which can be faked.

Page 18: 2016 Social Engineering Training

When in doubt, contact the I.T. department or Your Supervisor

DO NOT CLICK, RESPOND OR DOWNLOAD!

Courtesy: Action Fraud and the National Fraud Intelligence Bureau


Recommended