Staying Safe in a Connected World
Start
Recognize, Prevent, Protect
In today’s digital world, threats like phishing, malware, and social engineering are constantly evolving. Recognize these common cyber risks and equip you with practical strategies to prevent fraud.
Social Engineering
Phishing
Quishing
Malware (Malicious Software)
Fraud
Cybersecurity Red Flags
This unusual behavior might signal that a hacker has gained remote access to your computer.
Unauthorized software may contain malware designed to spy on your activities or harm your system.
This could indicate that someone has already accessed your account and changed your password.
Unfamiliar software installs on your device without your knowledge.
You are unable to log in to your online account.
Your mouse moves erratically or becomes unresponsive.
Phishing attempts often involve suspicious emails or messages that lure you into clicking harmful links designed to steal your information.
Cybercriminals may impersonate legitimate services to trick you into providing login credentials or personal details.
These could be signs of malware infection or unauthorized changes to your system settings.
You receive external messages prompting you to click on a link.
You encounter multiple pop-ups from unknown sources or experience unexpected browser redirects.
An unknown sender requests that you reset your password.
By staying informed and alert, you play a vital role in protecting both yourself and the organization from potential security breaches.
Quishing
QR codes have simplified the sharing of URLs, contact details, and payments, but they also present a rising threat from cybercriminals. This type of attack, called "quishing," involves phishing through QR codes and is becoming more prevalent, posing risks to both individuals and organizations.
Malicious uses of QR codes include:
- Embedding phishing links
- Delivering malware
- Compromising devices
Always be cautious when scanning QR codes, especially those received via email or other unverified sources.
Malware (Malicious Software)
Malware, short for malicious software, is designed to steal sensitive information, disrupt operations, or damage files. It often spreads through suspicious emails with harmful links or attachments. Common types of malware include viruses, worms, Trojans, spyware, and rootkits. Always stay cautious and avoid interacting with unexpected or unverified messages.
Phishing
An illegal act of gathering sensitive information like passwords, usernames, logins, and credentials. This act is usually done through email with bad links, or links that are infected with malware.
- Use the Report Message button to report suspicious emails.
Social Engineering
An online threat initiated by a person. This involves social interaction with the intent to gather information to be used against you. This will lead to hacking sensitive information which includes:
- Passwords
- Financial Information
- Network Access
- Database Access
Fraud
Fraud involves the misuse of sensitive information by individuals who abuse their access for illegal purposes. While it is a controllable internet crime, staying aware and practicing caution are essential.
Employees should promptly report any suspicious activity to fraud@results-cx.com.
Online Threats and Fraud Prevention
Stephanie Flint
Created on September 11, 2025
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Microcourse: Team Cybersecurity
View
Microcourse: Key Skills for the Professional Environment
View
Microcourse: Introduction to HTML
View
The Meeting Microlearning
View
The Meeting Microlearning Mobile
View
Isometric video mobile
View
Circles video mobile
Explore all templates
Transcript
Staying Safe in a Connected World
Start
Recognize, Prevent, Protect
In today’s digital world, threats like phishing, malware, and social engineering are constantly evolving. Recognize these common cyber risks and equip you with practical strategies to prevent fraud.
Social Engineering
Phishing
Quishing
Malware (Malicious Software)
Fraud
Cybersecurity Red Flags
This unusual behavior might signal that a hacker has gained remote access to your computer.
Unauthorized software may contain malware designed to spy on your activities or harm your system.
This could indicate that someone has already accessed your account and changed your password.
Unfamiliar software installs on your device without your knowledge.
You are unable to log in to your online account.
Your mouse moves erratically or becomes unresponsive.
Phishing attempts often involve suspicious emails or messages that lure you into clicking harmful links designed to steal your information.
Cybercriminals may impersonate legitimate services to trick you into providing login credentials or personal details.
These could be signs of malware infection or unauthorized changes to your system settings.
You receive external messages prompting you to click on a link.
You encounter multiple pop-ups from unknown sources or experience unexpected browser redirects.
An unknown sender requests that you reset your password.
By staying informed and alert, you play a vital role in protecting both yourself and the organization from potential security breaches.
Quishing
QR codes have simplified the sharing of URLs, contact details, and payments, but they also present a rising threat from cybercriminals. This type of attack, called "quishing," involves phishing through QR codes and is becoming more prevalent, posing risks to both individuals and organizations.
Malicious uses of QR codes include:
Always be cautious when scanning QR codes, especially those received via email or other unverified sources.
Malware (Malicious Software)
Malware, short for malicious software, is designed to steal sensitive information, disrupt operations, or damage files. It often spreads through suspicious emails with harmful links or attachments. Common types of malware include viruses, worms, Trojans, spyware, and rootkits. Always stay cautious and avoid interacting with unexpected or unverified messages.
Phishing
An illegal act of gathering sensitive information like passwords, usernames, logins, and credentials. This act is usually done through email with bad links, or links that are infected with malware.
Social Engineering
An online threat initiated by a person. This involves social interaction with the intent to gather information to be used against you. This will lead to hacking sensitive information which includes:
Fraud
Fraud involves the misuse of sensitive information by individuals who abuse their access for illegal purposes. While it is a controllable internet crime, staying aware and practicing caution are essential.
Employees should promptly report any suspicious activity to fraud@results-cx.com.