What is Phishing?
A cybercrime in which targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data
What is Spear Phishing?
A more targeted form of phishing, where attackers research their victims to create a more personalized and convincing lure.
Name one method to verify the authenticity of an email.
Check the sender's email address for discrepancies, look for poor spelling and grammar, or contact the company directly using information from their official website
You receive an email from your CEO asking for a wire transfer to a new vendor, what should you do?
Verify the request through a secondary communication channel, like a phone call, especially if the request is unusual or urgent.
What common tactic do phishing emails use to create a sense of urgency?
They often use alarming language and claim that immediate action is required to avoid negative consequences.
What is Vishing?
It's voice phishing, where fraudsters use phone calls to scam the victim.
What is the first step you should take if you suspect an email is phishing?
Do not click on any links or attachments and report the email to your IT department.
Your friend sends you a link to a site offering a free phone. What should you do?
Be skeptical and verify the offer by checking official sources or contacting your friend through another method to confirm they sent it.
What is a common sign of a phishing email?
Misspelled domain names or the use of subdomains that mimic legitimate websites.
What is Whaling?
A type of phishing targeted at high-profile individuals like CEOs, CFOs, etc.
What tool can help identify phishing emails?
Email security software that filters out suspicious messages.
You receive an email from your bank asking for your account details. What's your next step?
Contact your bank using official channels to verify the request.
Why is it important to keep software and systems updated in the context of phishing?
Updates often include security patches that protect against vulnerabilities that phishers may exploit.
What is Clone Phishing?
It involves creating a nearly identical replica of a legitimate message that has been previously sent, with malicious links or attachments.
What personal habit can reduce the risk of falling for phishing scams?
Setting complex passwords and using multi-factor authentication.
An email claims you have a package waiting but requires personal information to release it. How do you proceed?
Verify the sender by checking tracking numbers on the official courier website or contacting them directly.