Want to create interactive content? It’s easy in Genially!

Get started free

Online Threats and Fraud Prevention

Stephanie Flint

Created on September 11, 2025

Start designing with a free template

Discover more than 1500 professional designs like these:

Microcourse: Team Cybersecurity

Microcourse: Key Skills for the Professional Environment

Microcourse: Introduction to HTML

The Meeting Microlearning

The Meeting Microlearning Mobile

Isometric video mobile

Circles video mobile

Transcript

Staying Safe in a Connected World

Start

Recognize, Prevent, Protect

In today’s digital world, threats like phishing, malware, and social engineering are constantly evolving. Recognize these common cyber risks and equip you with practical strategies to prevent fraud.

Social Engineering

Phishing

Quishing

Malware (Malicious Software)

Fraud

Cybersecurity Red Flags

This unusual behavior might signal that a hacker has gained remote access to your computer.

Unauthorized software may contain malware designed to spy on your activities or harm your system.

This could indicate that someone has already accessed your account and changed your password.

Unfamiliar software installs on your device without your knowledge.

You are unable to log in to your online account.

Your mouse moves erratically or becomes unresponsive.

Phishing attempts often involve suspicious emails or messages that lure you into clicking harmful links designed to steal your information.

Cybercriminals may impersonate legitimate services to trick you into providing login credentials or personal details.

These could be signs of malware infection or unauthorized changes to your system settings.

You receive external messages prompting you to click on a link.

You encounter multiple pop-ups from unknown sources or experience unexpected browser redirects.

An unknown sender requests that you reset your password.

By staying informed and alert, you play a vital role in protecting both yourself and the organization from potential security breaches.

Quishing

QR codes have simplified the sharing of URLs, contact details, and payments, but they also present a rising threat from cybercriminals. This type of attack, called "quishing," involves phishing through QR codes and is becoming more prevalent, posing risks to both individuals and organizations.

Malicious uses of QR codes include:

  • Embedding phishing links
  • Delivering malware
  • Compromising devices

Always be cautious when scanning QR codes, especially those received via email or other unverified sources.

Malware (Malicious Software)

Malware, short for malicious software, is designed to steal sensitive information, disrupt operations, or damage files. It often spreads through suspicious emails with harmful links or attachments. Common types of malware include viruses, worms, Trojans, spyware, and rootkits. Always stay cautious and avoid interacting with unexpected or unverified messages.

Phishing

An illegal act of gathering sensitive information like passwords, usernames, logins, and credentials. This act is usually done through email with bad links, or links that are infected with malware.

  • Use the Report Message button to report suspicious emails.

Social Engineering

An online threat initiated by a person. This involves social interaction with the intent to gather information to be used against you. This will lead to hacking sensitive information which includes:

  • Passwords
  • Financial Information
  • Network Access
  • Database Access
Fraud

Fraud involves the misuse of sensitive information by individuals who abuse their access for illegal purposes. While it is a controllable internet crime, staying aware and practicing caution are essential.

Employees should promptly report any suspicious activity to fraud@results-cx.com.