Want to create interactive content? It’s easy in Genially!
Cyber Security DETECTIVE
Ashley Farley
Created on March 3, 2023
Over 30 million people create interactive content in Genially
Check out what others have designed:
Transcript
Click HERE to see what to do if an employee recieves a phishing email!
Don't Get Phished!
Never trust an email-based simply by the sender email address. Hackers have many ways to disguise emails and “spoof” the “from” sender. A common type of spoofing uses a visible alias and cousin domains.
Attacks Are Becoming More Personal
06
Spear-phishing attacks can be very personalized from purported colleagues and are designed to evoke fear of consequences at work.
Hackers Use Real Brand Images and Logos in Phishing Emails
05
Phishing Links Can Be Sent via Attachment
04
All phishing emails contain a link, but it’s not always in the email. To avoid detection by email security filters, hackers will include a phishing link in an attachment, such as a PDF or Word doc, rather than the body of the email.
Links Aren’t Always What They Seem
03
Content That Includes Enticing or Threatening Language
01
Email Addresses Can Be Spoofed
02
Brand logos and trademarks are no guarantee that an email is real. Brand images are public and can be downloaded from the internet or easily replicated.
Hover over all links before clicking them to see the pop-up that displays the link’s real destination. If it is not the website expected, it is probably a phishing attack.
A false promise, a quick reward, or a threat that you will lose something can create a sense of panic, urgency, or curiosity.
Cyber SecurityDETECTIVE