160 likes | 185 Views
See Something Phishy?. Presented By: Michelle Luttrell mjluttre@uci.edu Derek Chee dchee@uci.edu. What is Phishing?. Clicking on a malicious link or opening a malicious attachment can lead to: Malware installation Ransomware Links to fake websites. Malicious Links and Attachments.
E N D
See Something Phishy? Presented By: Michelle Luttrell mjluttre@uci.edu Derek Chee dchee@uci.edu
Clicking on a malicious link or opening a malicious attachment can lead to: Malware installation Ransomware Links to fake websites Malicious Links and Attachments Image source: https://www.skymesh.net.au/blog/email-scam-spotting/
Collecting Sensitive Information Attackers like to trick us into giving them sensitive information
Red Flags to Look Out For • Blank or generic greeting • Sense of urgency • Non-routine business requests • Suspicious email addresses • Request for sensitive information • Unfamiliar sender • Offer sounds too good to be true • Misspelling, typos, unfamiliar languages
Things You Can Do to Help • Become familiar with what phishing looks like • Verify email with sender • Use a password manager • Report to spam@uci.edu Image source: https://mainehost.com/protect-yourself-from-phishing-scams/
Email Security on Mobile Devices • ⅓ of UCI Employees check email using a mobile device • The smaller screen makes it harder to spot phishing • Things you can do: • Look for phishing red flags • Check the link by holding down on it (Risky, Be Careful Not to Click). • Verify the Sender • Inspect it on a larger screen
Resources • Report to spam@uci.edu (Happy to verify anything) • Phishing Awareness Program Webpage: https://security.uci.edu/private/phishingawareness.html • Email Safety Tips Webpage: https://security.uci.edu/secure-computer/email-safety.html • Phishing Awareness Training Modules on the UC Learning Center: http://uclc.uci.edu/
Training Modules on UCLC • http://uclc.uci.edu/ • Phishing Awareness: • Phishing 101 • Identifying Fraudulent URLs • Avoiding Dangerous Attachments • Data Entry Phishing • Email Security on Mobile Devices • Spear Phishing Threats • Protecting Against Ransomware