1 / 22

To: Employee From: impersonated official company Message: Give us personal information

Banana Bill Employee’s: Recognizing and Dealing with Phishing Scams. To: Employee From: impersonated official company Message: Give us personal information here <link>. You may be wondering what exactly a phishing scam is?. You may be wondering what exactly a phishing scam is?.

mare
Download Presentation

To: Employee From: impersonated official company Message: Give us personal information

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Banana Bill Employee’s: Recognizing and Dealing with Phishing Scams To: Employee From: impersonated official company Message: Give us personal information here <link>

  2. You may be wondering what exactly a phishing scam is?

  3. You may be wondering what exactly a phishing scam is? Phishing scams are not to be taken lightly as the can be very dangerous so first lets take a look at the definition to better understand phishing scams

  4. You may be wondering what exactly a phishing scam is? Phishing scams are not to be taken lightly as the can be very dangerous so first lets take a look at the definition to better understand phishing scams • Phishing is a term used to describe the act of receiving an e-mail, text message, or some other form of messaging where the message attempt to obtain person information of the receiver. The message does this by appearing professional and urgent. It also including a link where the receiver fills out personal information such as: • Credit card number • Address • Social insurance number • Online bank account number and password • etc

  5. An example of a phishing email that you might receive or have already received would be:

  6. An example of a phishing email that you might receive or have already received would be: To: Bbillemployee3@hotmail.com From: noreplyBMOfinances_45@bmo.com Subject: Important Account Change Dear loyal customer We have recently changed our security protocols for online banking and it is imperative that you sign in and update your account settings. Please do this immediately to avoid any further damage. Sign In (link to website)

  7. An example of a phishing email that you might receive or have already received would be: To: Bbillemployee3@hotmail.com From: noreplyBMOfinances_45@bmo.com Subject: Important Account Change Dear loyal customer • We have recently changed our security protocols for online banking and it is imperative that you sign in and update your account settings. Please do this immediately to avoid any further damage. • Sign In (link to website) The website that is linked will often look exactly like the official one. This may seem legitimist, however it is not

  8. But how do you spot phishing scams?

  9. But how do you spot phishing scams? By looking for specific characteristics and key phrases

  10. But how do you spot phishing scams? By looking for specific characteristics and key phrases • Characteristics • The content of a phishing e-mail or text message is intended to trigger a quick reaction from you and will demand an urgent response. Phishing messages are almost never personalized. • Phishing messages will often ask you for an update, confirmation, or validating you account or something bad will happen • Often messages and linked websites will include official looking logos, trademarks, and other identifying information

  11. But how do you spot phishing scams? By looking for specific characteristics and key phrases • Characteristics • The content of a phishing e-mail or text message is intended to trigger a quick reaction from you and will demand an urgent response. Phishing messages are almost never personalized. • Phishing messages will often ask you for an update, confirmation, or validating you account or something bad will happen • Often messages and linked websites will include official looking logos, trademarks, and other identifying information • Key Phrases • E-mail Money Transfer Alert: Please verify this payment information below… • It has come to our attention that your online banking profile needs to be updated as part of our continuous efforts to protect your account and reduce instances of fraud… • Dear Online Account Holder, Access To Your Account Is Currently Unavailable… • Important Service Announcement from…, You have 1 unread Security Message! • We regret to inform you that we had to lock your bank account access. Call (telephone number) to restore your bank account.

  12. What can happen when you fall victim to phishing?

  13. What can happen when you fall victim to phishing? Yes.. Ahem!... I’m Terrance Crone...the real one Identity theft

  14. What can happen when you fall victim to phishing? Yes.. Ahem!... I’m Terrance Crone...the real one Identity theft And what are the affects of identity theft you ask?

  15. What can happen when you fall victim to phishing? Yes.. Ahem!... I’m Terrance Crone...the real one Identity theft And what are the affects of identity theft you ask? Unknown credit card bills Available funds: $0

  16. What can happen when you fall victim to phishing? Yes.. Ahem!... I’m Terrance Crone...the real one Identity theft And what are the affects of identity theft you ask? Unknown credit card bills Unauthorized loans taken out in your name “Why is my bank account frozen!” Operator says, “we are holding your account pending payment on a three month late loan Payment. “Uh... What!? Available funds: $0

  17. An illegal immigrant can even work using your social security number if it’s given during a successful phishing scam What can happen when you fall victim to phishing? Yes.. Ahem!... I’m Terrance Crone...the real one Identity theft And what are the affects of identity theft you ask? Unknown credit card bills Unauthorized loans taken out in your name “Why is my bank account frozen!” Operator says, “we are holding your account pending payment on a three month late loan Payment. “Uh... What!? Available funds: $0

  18. Final Statements

  19. Final Statements Remember to always look for the characteristics and key phrases that a phishing scam would have. Also remember that if you believe the email to be legitimate contact the business who supposedly sent you the email by going to their website through a Google search or a bookmark, not the provided link, and phoning them. Another note to keep in mind is to get into the habit of regularly checking your bank, credit card, and debit card statement to ensure all transactions are legitimate.

  20. Final Statements Remember to always look for the characteristics and key phrases that a phishing scam would have. Also remember that if you believe the email to be legitimate contact the business who supposedly sent you the email by going to their website through a Google search or a bookmark, not the provided link, and phoning them. Another note to keep in mind is to get into the habit of regularly checking your bank, credit card, and debit card statement to ensure all transactions are legitimate. • We at Banana Bill whish to ensure your and oursafety when receiving emails at your work and personal addresses against phishing scams.

  21. Final Statements Remember to always look for the characteristics and key phrases that a phishing scam would have. Also remember that if you believe the email to be legitimate contact the business who supposedly sent you the email by going to their website through a Google search or a bookmark, not the provided link, and phoning them. Another note to keep in mind is to get into the habit of regularly checking your bank, credit card, and debit card statement to ensure all transactions are legitimate. • We at Banana Bill whish to ensure your and oursafety when receiving emails at your work and personal addresses against phishing scams. • Thanks for watching & enjoy the rest of your day!! • A message from your • CEO, Terrance Crone • Terrance Crone

  22. Work Cited Slide 10,11,17,21: “E-mail Fraud / Phishing.” Rcmp.gc.org. Royal Canadian Mounted Police. January 25 2013 <http://www.rcmp-grc.gc.ca/scams-fraudes/phishing-eng.htm> Slide 10,11,17,21: “Phishing.” ongaurdonline.gov. OnGuardOnline.gov. January 25 2013 <http://www.onguardonline.gov/phishing#examples of phishing messages> Slide 10,11,17,21: “Phishing.” wikipedia.org. Wikipedia The Free Encyclopedia. January 25 2013 <http://en.wikipedia.org/wiki/Phishing> Slide: 1“Free Music Track 1.” soundjay.com. SOUND JAY. January 25 2013 <http://www.soundjay.com/free-music-1.html> (Only music is required to be cited on this website not the other sounds used) Slide: 5,8, 18: “background and Photoshop patterns.” Backgroundlabs.com. Background Labs free background & patterns. January 25 2013. <http://www.backgroundlabs.com/> Slide 6,7: “A Thoroughly Reputable Bank.” rbccriminalintent.com. A True David and Goliath Story. January 25 2013 <http://rbccriminalintent.com/site/index.php?option=com_content&task=view&id=71&Itemid=112> (All other images are used through Microsoft clip art and are allowed to be used in presentations/school projects)

More Related