What is Phishing, and How Not to Get Caught - PowerPoint PPT Presentation

About This Presentation
Title:

What is Phishing, and How Not to Get Caught

Description:

Phishing is an attack that tries to fool you into giving a hacker with malicious intent access to your technology. – PowerPoint PPT presentation

Number of Views:1
Slides: 12
Provided by: danieljones0094
Category: Other
Tags:

less

Transcript and Presenter's Notes

Title: What is Phishing, and How Not to Get Caught


1
What is Phishing, and How Not to Get Caught
2
Protecting your technology from cyber attacks is
very important, but even if you have good
antimalware software and properly configured
firewalls on your devices, hackers may still
attack your devices by phishing. No, thats not a
misspelling. Phishing is an attack that tries to
fool you into giving a hacker with malicious
intent access to your technology.
  • The Risk Successful phishing attacks can be
    extremely expensive and disruptive. If your
    technology stores financial data, your accounts
    might be drained, and you may have to shut down
    all of your existing accounts and open new ones.
    If your technology stores personal data, your
    identity might be stolen. If the data stored on
    your technology is valuable, it might be held for
    ransom.

3
How Phishing Attacks Work
4
  • A phishing attack starts when you receive an
    email, phone call, or text message that appears
    to come from a company or person you know but is
    actually from a bad actor trying to get access to
    your technology for malicious purposes. The idea
    is to either scare or entice you into calling,
    clicking on a button or link, or responding to a
    text message.
  • The majority of phishing attackers impersonate
    big banks or credit card companies, technology
    companies like Microsoft and Apple, or online
    retailers like Amazon.

5
  • The call, email, or text message may say that
    there is some problem with your device and the
    caller/ sender can help you get that resolved. Or
    it may describe an enticing offer. If the bad
    actor gets you to call, he will try to get you to
    install some remote access software and give him
    permission to use it. If the bad actor gets you
    to click on a button or link in an email or
    respond to a text message, that will launch a
    program that gives the bad actor access. Once the
    bad actor has access to your technology, he will
    install some form of malware which he plans to
    use later to extract data, corrupt your device,
    and/or set up a ransom situation.
  • If you are an Apple user, be especially warry of
    giving anyone you dont personally know your
    Apple ID It can be used to cause all kinds of
    harm. The same goes for Microsoft Account
    credentials.

6
Protection
7
  • Some antimalware software may protect you from
    email-launched malware. No antimalware software
    can protect you from harm if you give a bad actor
    remote access to your technology.
  • The only effective protection is your awareness
    of the risk, being skeptical of calls, emails,
    and text messages like those described above, and
    avoiding giving strangers access to your
    technology. Dont go for the bait.

8
Recommendations
9
  • No reputable manufacturer or software company
    will call you about issues on your device or ask
    for payment to help. If an email seems too good
    to be true, it probably is bogus. Click Away
    recommends
  • Never give anyone you dont personally know
    permission to install or use a remote access
    tool.
  • If you have any concerns about an email, check
    that its email address domain (last 2 elements
    xxxxxx.xxx) matches the real companys website
    and is spelled correctly. If the email seems
    bogus, dont open it just delete it. You can
    always use the real companys website to contact
    them.

10
  • Never call a phone number on an email. If you
    want to call a company, go to their website, and
    get their real phone number.
  • Always be extremely skeptical. Better safe than
    sorry. When in doubt, give Click Away a call also
    you can search for the shop click away near me.
  • Back up your data frequently to reduce potential
    financial risk.
  • If you think you have been successfully phished,
    immediately contact any financial institutions
    where you have accounts that might be affected,
    turn off your device, and bring it in to Click
    Away for a free malware scan.

11
Original Source-
https//clickaway.com/what-is-phishing-and-how-not
-to-get-caught/
For More interesting stuff like this subscribe
to clickaway.com newsletter.
Write a Comment
User Comments (0)
About PowerShow.com