Security Awareness
Training
wizer-training.com
wizer-training.com
Phishing
When scammers
FOOL YOU to think
they are someone
you trust in order to
make you DO
SOMETHING
7 Types of Phishing Scams
You Should Know About
Email Phishing Scams
It may look likean
email fromyour
bank, Paypal,
Google, Amazon,or
even your CEO
Spear Phishing Scams
This is when they target
you specifically. They
have researched you,
they know your family
members, where you
work, and who is your
boss. The chances of
fooling you are higher.
Smishing Scams
These are text message phishing scams.
Criminals know people respond to text
and instant messages faster than email.
Lookalike Contacts. Generic Contact
1 Name is similar to Trusted Contact role.
Message conveys sense of urgency and
2
fear.
Lookalike URL. Scammers buy lookalike
3 domains similar to, but different from,
the real company site.
Google Search Scams
You may be surprised, but some of the top
search results in Google are phishing links.
Scammers also invest in search engine
optimization and work hard to rank their
scam sites in the top search results.
Search Result Shows Brand
1 Title displays correct brand name
URL Mismatch. Title says Venmo but URL
2
is a generic sites.google.com
2nd Result for Organic Search
3 Even top search results can be
manipulated for fake sites
Social Media Scams
Social media is full
of fake accounts.
It could also be a fake
account with the same
name and photo as one
of your real friends that
will later try to scam you.
QR Code Scams
Who thought a QR code
could be dangerous?
They are everywhere, especially in
restaurants. Criminals can place
their own sticker over the legitimate
one. So that when you scan it, you
will be redirected to a fake site.
Real URL
1 Add legitimacy to ad
QR Code. Hides actual URL that directs
2 to a fake site
Vishing Scams
Vishing (voice phishing) is
a type of phishing attack
made over the telephone.
Scammers can spoof a
phone number that looks
identical to a known
number, like your bank.
What Helps Protect You From Phishing Attacks?
If it’s urgent, don’t let the emotions cloud your judgment
Call and verify! - Verify that you are talking to the correct
person
Check the address - Always check the email address
and URL for spelling mistakes
Policy Awareness Gap
Look at the style of the message
Ask Questions
How Long Will it Take to Crack Your Password
7 characters 1 minute
8 characters 1 hour
9 characters 3-4 days
10 characters 7 months
11 characters 40 year
12 characters 2000 years
Passwords include - Lowercase, Uppercase and Numbers
Passwords
How To Create a Strong Password:
Passwords need to be LONG!
Use a phrase (NO personal info like
your name or B-Day)
DON’T reuse passwords!
However…
11 BILLION Accounts were stolen from
hacked sites and apps.
So even if you have a STRONG
PASSWORD, it may still not be enough.
You can check if yours was leaked
at haveibeenpwned.com
And That is Why You should Enable
Multi-Factor Authentication
This will help to protect
your account if your
password was stolen or
leaked in a data breach.
What Type of Multi-Factor
Authentication to use?
Most common is text based (SMS),
but it’s the least secure
It’s better to use authenticator apps
like Google or Microsoft Authenticator
Or even better yet, a physical USB key
Malware
Ransomware
When criminals hack your
computer or network, lock
you out, and demand a
ransom to let you back in.
How to Avoid Ransomware
Don’t download files from random websites
Beware of phishing emails with attachments
(See phishing section)
Don’t use your company email or password for
personal stuff
Don’t store password in text files or
spreadsheets
Voice Cloning and Deep Fake
What is Voice Cloning
A mere 5-second sample of your voice from social media is
enough to clone your voice and impersonate you over the phone.
How do criminals use this?
You receive a phone call from someone pretending to be your child,
claiming they're in trouble and need money - but it's not really them.
You get a call from someone impersonating
your boss, asking you to wire money - but
it'snot actually your boss.
How to avoid scammed by Voice Cloning
Establish a “Family Safety Word” that
only your family knows to confirm
identity in case of emergencies.
If you receive a suspicious call, hang
up and contact the person directly.
Use an alternative method, such as a text
message or email, to verify their identity.
Don’t trust a voice just because it sounds
familiar.
Let’s Be Real — DeepFakes Are Getting Scary Good!
It’s not about squinting at
pixels or analyzing lighting.
Forget trying to CSI every
video frame.
The Real Question:
👉 Who’s sharing this?
The Playbook for Spotting DeepFakes
Check the Source
Is this from the original creator, or just
someone re-sharing it for clout?
Ask the Agenda Question
What’s in it for them? Are they pushing
a narrative, selling something, or
stirring up drama?
Pro Tip: Start treating “Agenda” and
“Source” as the new metadata for
everything you consume.
ChatGPT And Similar Apps
Tips For Using AI Tools Securely
Be aware there are many fake AI apps and browser
extensions out there that claim to be AI tools, but they
are actually malware or phishing scams.
Never enter any sensitive info or PII when using AI
tools, it puts our data at risk.
Remove any mentions of our organization, people or
customers before using it.
Always consult with the IT Team before using anything
for work-related purposes.
REMEMBER: AI doesn’t really understand the question!
Protect Your Mobile Device
Limit Apps From Collecting Your Data
Disable Individual Apps From Tracking You
Disable Apps From Tracking You Even When
You Are Not Using Them
Find Out If You Are Sharing Your Location With
Friends
Avoid Using a Simple PIN to unlock your phone
Step by step guide on how to do this:
www.wizer-training.com/citizens/safeguard-your-privacy
Data Leaks
Share Google Docs carefully — avoid giving "Editor"
access to everyone and set expiration dates for
external sharing.
Remove PII before using ChatGPT or any external AI tool.
Avoid unauthorized plugins — they can track your
browser activity.
Hey!
Why use this PowerPoint
when you can assign
these training topics &
more for FREE?
Create a Free Account!
wizer-training.com
Our Approach
Training your organization
doesn't have to be boring.
We make security awareness
training simple, fun, and
effective with 1-min videos +
micro-learning. Your learners
are going to love it!
Create a Free Account!
wizer-training.com
Wire Fraud
What is Wire Fraud?
It’s when you’re tricked into wiring money to a
fraudulent bank account. For example:
An urgent request to wire money from a criminal
who impersonates your CEO through hacking your
CEO’s email account.
They hacked one of your vendors and sent you an
invoice with fake bank information.
If you’re tricked into wiring money to a fraudulent bank account,
the bank may not be there to help you. After all, it’s you who
transferred the money, not the criminal.
How to Avoid Wire Fraud
Call and verify any money Request
Call a known number that you used before or
from the vendor management system
Verify that the bank info match the one on file
Call and verify any request to change info on
file, like phone number, address or bank info
MFA Guide, Family guide, Online
shopping guide, Wire fraud kit
How to Avoid Wire Fraud
Family Online Safety Tips
Online Shopping Scam Prevention Kit
MFA Setup Guide
Whew!
You made it.
Get more tips to #stayWizer online at wizer-training.com