Click me
Transcribed

Pishing & Whaling

PHISHING WHALING HOW BUSINESSES CAN OUTSMARTA DIGITAL THIEF Careful, the next email you click on could lead to cyber crime and its costly consequences. Cybercriminals are becoming increasingly adept at hiding malicious attack tools. THE SCHEMES DEFINED 1, 2 PHISHING CONFIRM When digital thieves steal information by posing as a legitimate entity. YOUR BANK THE BAIT ******* Professional looking emails designed to trick individuals and businesses into providing ******* WHALING When the victim is a high-profile individual sensitive information, THE IMPACСТ 3,4,5 23% of recipients open phishing emails 156 80,000 MILLION PEOPLE phishing emails sent fall victim to these scams 11% open the attachments WHY IT WORKS Jane: II ... SOME EMAILS USE FEAR TACTICS EMAILS LOOK LEGITIMATE OR URGENCY TRIGGERS LIKE RECALLS OR HEALTH CONCERNS EMPLOYEES LACK KNOWLEDGE AND ARE PERSONALIZED TO SPOT FRAUDULENT EMAILS TO MAKE READERS ACT FAST TYPES OF EMAILS TO WATCH FOR7 TECHNICAL 21.3% look like error messages or account updates ******* CORPORATE 15.3% look like professional business email COMMERCIAL 12.9% look like social media notifications or donation requests PRECAUTIONS EVERY BUSINESS SHOULD TAKE 8,9 C 冰 * Install software that requires authentication Educate employees. Your best protection against phishing attacks is a combination of training and awareness Install top-of-the-line anti-virus, Consult with a Cybersecurity professional to maximize safety to access or transfer anti-malware money software RISING CYBERCRIME, GROWING NEEDS 10 DECREASE 11 INCREASE OPPORTUNITY IN JOB POSTINGS IN SKILLED CYBER FOR CAREER PROFESSIONALS ADVANCEMENT. 74% 82% 209,000 MORE OVER LAST CYBER POSITIONS 5 YEARS OF ORGANIZATIONS CITE A SHORTAGE ARE UNFILLED. 3,500 BUSINESSES ARE VICTIMIZED YEARLY, $370 RESULTING IN LOSSES OF MILLION YOU CAN STOP CYBER CRIMINALS LEARN HOW TODAY Utica College offers a wide selection of certificates, bachelors, and masters degree programs in Cybersecurity and Cyber Policy, which provide the skills needed to pursue a career in this fast-paced and demanding field. UTICA COLLEGE 'What is Phishing? Microsoft. https://www.mlcrosoft.com/en-us/safety/online-privacy/phishing-symptoms.aspx 2 Whaling: Why go after Minnows When You Can Catch Big Phish. Social Engine er. https://www.soclal-engineer.com/whaling-why-go-arter-minnows-when-you-can-catch-a-big-phish/ Phishing: Why Take the Bait. Get Cyber Safe. http://www.getcybersafe.gc.ca/cnt/rsrcs/nfgrphcs/nfgrphcs-2012-10-11-en.aspx * https://mslsac.clsecurity.org/whitepaper/documents/1.pdr * https://www.shredit.com/en-us/blog/securing-your-Information/march-2016/email-fraud-would-your-employees-recognize-these * Why Phishing Works. Security Week. http://www.securityweek.com/why-phishing-works-and-how-avold-becoming-victim *Impact Phishing has on Business. Wombat Security. https://Info.wombatsecurity.com/blog/Infographic-what-Impact-does-phishing-have-on-your-business Phishing Works. Secu Veek. http urityweek.com/why-phishing- how-avold-becoming-victim * Business Email Compromise. FBI. https://www.rbl.gov/hews/storles/2015/august/business-e-mail-compromise/business-e-mall-compromise 10 http://www.fastoompany.com/3062210/the-tuture-of-work/the-most-critical-sklls-gap-cybersecurity " One million Cybersecurity Jobs open in 2016. Forbes. http://www.forbes.com/sites /stevemorgan/2016/0/02/one-million-cybersecurity-job-openings-In-2016/#4640a73b7d27 ....

Pishing & Whaling

shared by Mbtassino on Jan 14
14 views
0 shares
0 comments
How Business can outsmart a digital thief. Another version of the infographic about Phishing fot Utica College - See more at: http://visual.ly/pishing-whaling#sthash.tJFbGD9O.dpuf

Source

Unknown. Add a source

Category

Education
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size