[go: up one dir, main page]

0% found this document useful (0 votes)
37 views36 pages

Security Awareness Training Powerpoint

Uploaded by

daniel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views36 pages

Security Awareness Training Powerpoint

Uploaded by

daniel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

Security Awareness

Training
wizer-training.com

wizer-training.com
Phishing
When scammers
FOOL YOU to think
they are someone
you trust in order to
make you DO
SOMETHING
7 Types of Phishing Scams
You Should Know About
Email Phishing Scams

It may look likean


email fromyour
bank, Paypal,
Google, Amazon,or
even your CEO
Spear Phishing Scams

This is when they target


you specifically. They
have researched you,
they know your family
members, where you
work, and who is your
boss. The chances of
fooling you are higher.
Smishing Scams

These are text message phishing scams.


Criminals know people respond to text
and instant messages faster than email.

Lookalike Contacts. Generic Contact


1 Name is similar to Trusted Contact role.

Message conveys sense of urgency and


2
fear.

Lookalike URL. Scammers buy lookalike


3 domains similar to, but different from,
the real company site.
Google Search Scams
You may be surprised, but some of the top
search results in Google are phishing links.
Scammers also invest in search engine
optimization and work hard to rank their
scam sites in the top search results.

Search Result Shows Brand


1 Title displays correct brand name

URL Mismatch. Title says Venmo but URL


2
is a generic sites.google.com

2nd Result for Organic Search


3 Even top search results can be
manipulated for fake sites
Social Media Scams

Social media is full


of fake accounts.
It could also be a fake
account with the same
name and photo as one
of your real friends that
will later try to scam you.
QR Code Scams
Who thought a QR code
could be dangerous?

They are everywhere, especially in


restaurants. Criminals can place
their own sticker over the legitimate
one. So that when you scan it, you
will be redirected to a fake site.

Real URL
1 Add legitimacy to ad

QR Code. Hides actual URL that directs


2 to a fake site
Vishing Scams

Vishing (voice phishing) is


a type of phishing attack
made over the telephone.
Scammers can spoof a
phone number that looks
identical to a known
number, like your bank.
What Helps Protect You From Phishing Attacks?
If it’s urgent, don’t let the emotions cloud your judgment

Call and verify! - Verify that you are talking to the correct
person
Check the address - Always check the email address
and URL for spelling mistakes

Policy Awareness Gap

Look at the style of the message

Ask Questions
How Long Will it Take to Crack Your Password

7 characters 1 minute

8 characters 1 hour

9 characters 3-4 days

10 characters 7 months

11 characters 40 year

12 characters 2000 years

Passwords include - Lowercase, Uppercase and Numbers


Passwords
How To Create a Strong Password:

Passwords need to be LONG!

Use a phrase (NO personal info like


your name or B-Day)

DON’T reuse passwords!


However…

11 BILLION Accounts were stolen from


hacked sites and apps.

So even if you have a STRONG


PASSWORD, it may still not be enough.

You can check if yours was leaked


at haveibeenpwned.com
And That is Why You should Enable
Multi-Factor Authentication

This will help to protect


your account if your
password was stolen or
leaked in a data breach.
What Type of Multi-Factor
Authentication to use?

Most common is text based (SMS),


but it’s the least secure
It’s better to use authenticator apps
like Google or Microsoft Authenticator

Or even better yet, a physical USB key


Malware
Ransomware

When criminals hack your


computer or network, lock
you out, and demand a
ransom to let you back in.
How to Avoid Ransomware

Don’t download files from random websites

Beware of phishing emails with attachments


(See phishing section)
Don’t use your company email or password for
personal stuff
Don’t store password in text files or
spreadsheets
Voice Cloning and Deep Fake
What is Voice Cloning

A mere 5-second sample of your voice from social media is


enough to clone your voice and impersonate you over the phone.

How do criminals use this?

You receive a phone call from someone pretending to be your child,


claiming they're in trouble and need money - but it's not really them.

You get a call from someone impersonating


your boss, asking you to wire money - but
it'snot actually your boss.
How to avoid scammed by Voice Cloning

Establish a “Family Safety Word” that


only your family knows to confirm
identity in case of emergencies.

If you receive a suspicious call, hang


up and contact the person directly.

Use an alternative method, such as a text


message or email, to verify their identity.
Don’t trust a voice just because it sounds
familiar.
Let’s Be Real — DeepFakes Are Getting Scary Good!

It’s not about squinting at


pixels or analyzing lighting.
Forget trying to CSI every
video frame.

The Real Question:


👉 Who’s sharing this?
The Playbook for Spotting DeepFakes

Check the Source


Is this from the original creator, or just
someone re-sharing it for clout?

Ask the Agenda Question


What’s in it for them? Are they pushing
a narrative, selling something, or
stirring up drama?

Pro Tip: Start treating “Agenda” and


“Source” as the new metadata for
everything you consume.
ChatGPT And Similar Apps
Tips For Using AI Tools Securely

Be aware there are many fake AI apps and browser


extensions out there that claim to be AI tools, but they
are actually malware or phishing scams.

Never enter any sensitive info or PII when using AI


tools, it puts our data at risk.

Remove any mentions of our organization, people or


customers before using it.

Always consult with the IT Team before using anything


for work-related purposes.

REMEMBER: AI doesn’t really understand the question!


Protect Your Mobile Device
Limit Apps From Collecting Your Data

Disable Individual Apps From Tracking You

Disable Apps From Tracking You Even When


You Are Not Using Them

Find Out If You Are Sharing Your Location With


Friends

Avoid Using a Simple PIN to unlock your phone

Step by step guide on how to do this:


www.wizer-training.com/citizens/safeguard-your-privacy
Data Leaks

Share Google Docs carefully — avoid giving "Editor"


access to everyone and set expiration dates for
external sharing.

Remove PII before using ChatGPT or any external AI tool.

Avoid unauthorized plugins — they can track your


browser activity.
Hey!
Why use this PowerPoint
when you can assign
these training topics &
more for FREE?

Create a Free Account!

wizer-training.com
Our Approach

Training your organization


doesn't have to be boring.

We make security awareness


training simple, fun, and
effective with 1-min videos +
micro-learning. Your learners
are going to love it!

Create a Free Account!

wizer-training.com
Wire Fraud
What is Wire Fraud?

It’s when you’re tricked into wiring money to a


fraudulent bank account. For example:

An urgent request to wire money from a criminal


who impersonates your CEO through hacking your
CEO’s email account.

They hacked one of your vendors and sent you an


invoice with fake bank information.

If you’re tricked into wiring money to a fraudulent bank account,


the bank may not be there to help you. After all, it’s you who
transferred the money, not the criminal.
How to Avoid Wire Fraud

Call and verify any money Request

Call a known number that you used before or


from the vendor management system

Verify that the bank info match the one on file

Call and verify any request to change info on


file, like phone number, address or bank info
MFA Guide, Family guide, Online
shopping guide, Wire fraud kit

How to Avoid Wire Fraud

Family Online Safety Tips

Online Shopping Scam Prevention Kit

MFA Setup Guide


Whew!
You made it.
Get more tips to #stayWizer online at wizer-training.com

You might also like