SlideShare a Scribd company logo
4
Most read
10
Most read
17
Most read
Millions of people are targets of phishing scams each day. Cyber criminals use a variety of tricks to disguise themselves
as legitimate companies, your colleagues, and people you would normally trust. Make sure you know who you are really
communicating with and be careful of suspicious links.
October is National Cyber Security Awareness Month. For more information and tips to stay safe online,
visit: https://www.dhs.gov/ncsam
Doessomething
seem“phishy”toyou?
How to Spot a Phishing Scam
Generic subject line
Legitimate emails usually
have detailed subject lines.
A vague subject line can
be a key indicator of a
phishing scam.
Suspicious URL
Hover over links included
in emails to see the actual
destination of the URL.
Bad grammar/spelling
Phishing emails often contain
misspelled words and bad
grammar. This is a sign that the
email did not come from a
professional organization or a
real person you may know.
Dear Webmail User,
You are required to authenticate your account below to continue sending and receive
messages. We strongly advice you to upgrade now to protect your web/Domain and
avoid termination. Follow link to verify your email address immediately:
www.security.webmail.com.
Failure to update might process your account as inactive, and you may experience
termination of services or undue errors. Please comply with new server requirements
and read through the attached privacy policy.
Wondering why you go this email?
This email was sent automatically during routine security checks. We are trying to
protect your account so you can continue using services uninterrupted.
Thanks,
Webmail Master
©2017 Webmail Domain
Subject: Urgent Email
From: Webmail Master Security (webmastersecurity@webmail.com)
Improper use of
copyright
Watch for improper use of
copyright information. This
is used to make the phishing
email look official.
Unnecessary urgency
Use your intuition and if
something 'feels' wrong, consider
calling the organization or office
directly to validate the email.
Types of Social Engineering
Online communications or emails
designed to lure individuals into
providing sensitive information.
Tip: When in doubt, throw it out. If
an email looks suspicious, contact
the organization/individual
directly to validate the legitimacy
of the email. You can also report
the email to your email provider’s
IT Security department.
An act of wrongfully obtaining
and using another person’s
information that involves fraud
or deception.
Tip: Be diligent before posting
personal information online and
think carefully before sharing
information through apps
and websites.
Identity Theft:Phishing:
A type of malware that prevents
or limits users from accessing
their system or select files,
unless a ransom is paid to
restore access.
Tip: Be proactive and protect
against data loss by backing up
your files and keeping them
safe on a physical, external
storage device.
Ransomware:
For more information and tips to stay safe online throughout the year, visit: https://www.dhs.gov/ncsam
Cyber crime is a critical threat with social engineering attacks becoming more sophisticated, realistic, and difficult to
recognize. Phishing attacks are one of the most common forms of cyber crime. What does a phishing email look like?
Review the example below for characteristics of a phishing scam disguised to look like a legitimate email.
DON’T GET REELED IN.
Phishing is a scam by which an
email user is duped into revealing
personal or confidential
information that the scammer can
use illicitly or fraudulently.
PHISHING
PREVENTION 101
Secure yourself from fraud
and phishing attempts by:
• Turning off the option to
automatically download
attachments
• Saving and scanning any
attachments before opening them
• Before providing any kind of
information, call and verify
with the source that they are
indeed the ones who sent the
email or message
For more information
on phishing visit:
http://www.cdse.edu/toolkits/cybersecurity
•	 	Do not open attachments or click on links from untrusted
sources
•		Never send personal information in an email
•	 	Keep your firewall and antivirus software updated
CYBER SECURITY IS OUR SHARED RESPONSIBILITY
DON’T TAKE
THE BAIT
CONNECT
WITH CARE
•	 	Keep your devices updated with the latest system and
application patches
•		Assume that Wi-Fi connections are not secure, since many
Wi-Fi hotspots don’t encrypt the information you send
•	 	Do not log into financial accounts or other sensitive accounts
when using public Wi-Fi networks
•	 	Consider turning off features on your computer or mobile
devices that allow you to automatically connect to Wi-Fi
CYBER SECURITY IS OUR SHARED RESPONSIBILITY
Cybersecurity Awareness Posters - Set #2
CYBER SECURITY IS OUR SHARED RESPONSIBILITY
PROTECT YOUR
SMART PHONE
•	 Make sure the OS and software
are up to date at all times
•	 Download apps from reputable
sites and closely review permission
requests
•	 Make sure to check the feedback
from other users before installing
the program from an app store
•	 Use a strong,complex password
•	 Use a security app,if available for your
device
•	 Turn off Bluetooth and other
connections when not in use
•		Jailbreak your phone
•		Download apps from third-
party app stores and sites
•		Leave your mobile device
unattended in public places
•		Enable your“Wi-Fi ad-hoc
mode”
DO’S DON’TS
KEEP YOUR PASSWORD SAFE BY FOLLOWING
THESE EASY TIPS:
DEVELOP strong passwords that use a combination of words, numbers, symbols, and
both upper- and lower-case letters
CREATEa password phrase and make it relevant. If you’re joining a shopping site for
example, think “About to Use Shopping Site” and use “ABT2_uz_$h0pping”
USE different passwords for every unique account, such as work, banking, and email
DISABLE the “save password” feature in your Internet browser
CYBER SECURITY IS OUR SHARED RESPONSIBILITY
USE SECURE
PASSWORDS
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2

More Related Content

PPTX
Cybersecurity Awareness for employees.pptx
PDF
Nat'l Cyber Security Awareness Month (NCSAM) Posters
PDF
Cybersecurity Awareness Infographics
PPT
General Awareness On Cyber Security
PDF
Cyber security awareness presentation nepal
PPTX
Cyber Security Awareness Program.pptx
PPTX
User security awareness
PPTX
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness for employees.pptx
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Cybersecurity Awareness Infographics
General Awareness On Cyber Security
Cyber security awareness presentation nepal
Cyber Security Awareness Program.pptx
User security awareness
Cybersecurity Awareness Session by Adam

What's hot (20)

PPTX
Cyber Security 101: Training, awareness, strategies for small to medium sized...
PPTX
Cybercrime and Security
PPTX
Cybersecurity Awareness
PPTX
Security Awareness Training.pptx
PPTX
Cybersecurity Awareness Training
PDF
Cyber Security Awareness
PDF
Employee Security Awareness Program
PPTX
Computer & internet Security
PPTX
Information Security Awareness Training Open
PPTX
Mobile Application Security
PPTX
Hyphenet Security Awareness Training
PPTX
Information security awareness - 101
PPTX
PPTX
Cyber security
PDF
Cybersecurity Awareness Training Presentation v2021.08
PDF
End-User Security Awareness
PPTX
Social Networking Security
PDF
14 tips to increase cybersecurity awareness
PPTX
Social media privacy and safety
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cybercrime and Security
Cybersecurity Awareness
Security Awareness Training.pptx
Cybersecurity Awareness Training
Cyber Security Awareness
Employee Security Awareness Program
Computer & internet Security
Information Security Awareness Training Open
Mobile Application Security
Hyphenet Security Awareness Training
Information security awareness - 101
Cyber security
Cybersecurity Awareness Training Presentation v2021.08
End-User Security Awareness
Social Networking Security
14 tips to increase cybersecurity awareness
Social media privacy and safety
Ad

Similar to Cybersecurity Awareness Posters - Set #2 (20)

PPTX
Cybersecurity-Awareness-Month-2024-Cyber-101-PPT.pptx
PPTX
Cybersecurity-Awareness-Month-2024-Cyber-101-PPT.pptx
PDF
Customer information security awareness training
PPTX
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
PPTX
Internet Security
PDF
Introduction to information security
PPTX
Personal cyber security tips remote work
PPTX
Cyber security-1.pptx
PPSX
IDENTIFYING CYBER THREATS NEAR YOU
PPTX
TheCyberThreatAndYou2_deck.pptx
PPT
cyber security unit-1, r20-JNTUK-USED FOR STUDENTS
PDF
Phishing & Cyber Attack Awareness
PPTX
Internet Safety.pptx
PPTX
Cyber security
PDF
Online Security
PDF
Are Your Security Aware?
PPTX
Cyber safety and protecting yourself online ppt
PPTX
Cybersecurity-Awareness-Month-2024_Cobranded-and-Accessible.pptx
PPTX
Cyber Security and prevention Presentation.pptx
PDF
National Life IT Department's Cyber Security Awareness Presentation
Cybersecurity-Awareness-Month-2024-Cyber-101-PPT.pptx
Cybersecurity-Awareness-Month-2024-Cyber-101-PPT.pptx
Customer information security awareness training
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
Internet Security
Introduction to information security
Personal cyber security tips remote work
Cyber security-1.pptx
IDENTIFYING CYBER THREATS NEAR YOU
TheCyberThreatAndYou2_deck.pptx
cyber security unit-1, r20-JNTUK-USED FOR STUDENTS
Phishing & Cyber Attack Awareness
Internet Safety.pptx
Cyber security
Online Security
Are Your Security Aware?
Cyber safety and protecting yourself online ppt
Cybersecurity-Awareness-Month-2024_Cobranded-and-Accessible.pptx
Cyber Security and prevention Presentation.pptx
National Life IT Department's Cyber Security Awareness Presentation
Ad

More from NetLockSmith (9)

PDF
10 Clever Cybersecurity Awareness Posters
PDF
Cybersecurity Awareness Posters from OpenIDEO
PDF
JP Cybersecurity Awareness Cartoons
PDF
NCSC Social Engineering Awareness Posters
PDF
DoE Cybersecurity Awareness Posters
PDF
CDSE Cybsecurity Awareness Posters
PDF
Cybersecurity Awareness (Spanish) posters
PDF
Cybersecurity awareness posters
PPSX
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
10 Clever Cybersecurity Awareness Posters
Cybersecurity Awareness Posters from OpenIDEO
JP Cybersecurity Awareness Cartoons
NCSC Social Engineering Awareness Posters
DoE Cybersecurity Awareness Posters
CDSE Cybsecurity Awareness Posters
Cybersecurity Awareness (Spanish) posters
Cybersecurity awareness posters
NIST presentation on RMF 2.0 / SP 800-37 rev. 2

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Cloud computing and distributed systems.
PDF
Empathic Computing: Creating Shared Understanding
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Electronic commerce courselecture one. Pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Machine learning based COVID-19 study performance prediction
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
A Presentation on Artificial Intelligence
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPT
Teaching material agriculture food technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Cloud computing and distributed systems.
Empathic Computing: Creating Shared Understanding
Review of recent advances in non-invasive hemoglobin estimation
“AI and Expert System Decision Support & Business Intelligence Systems”
Electronic commerce courselecture one. Pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Digital-Transformation-Roadmap-for-Companies.pptx
Machine learning based COVID-19 study performance prediction
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
A Presentation on Artificial Intelligence
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Teaching material agriculture food technology
Understanding_Digital_Forensics_Presentation.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Modernizing your data center with Dell and AMD
NewMind AI Monthly Chronicles - July 2025
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...

Cybersecurity Awareness Posters - Set #2

  • 1. Millions of people are targets of phishing scams each day. Cyber criminals use a variety of tricks to disguise themselves as legitimate companies, your colleagues, and people you would normally trust. Make sure you know who you are really communicating with and be careful of suspicious links. October is National Cyber Security Awareness Month. For more information and tips to stay safe online, visit: https://www.dhs.gov/ncsam Doessomething seem“phishy”toyou?
  • 2. How to Spot a Phishing Scam Generic subject line Legitimate emails usually have detailed subject lines. A vague subject line can be a key indicator of a phishing scam. Suspicious URL Hover over links included in emails to see the actual destination of the URL. Bad grammar/spelling Phishing emails often contain misspelled words and bad grammar. This is a sign that the email did not come from a professional organization or a real person you may know. Dear Webmail User, You are required to authenticate your account below to continue sending and receive messages. We strongly advice you to upgrade now to protect your web/Domain and avoid termination. Follow link to verify your email address immediately: www.security.webmail.com. Failure to update might process your account as inactive, and you may experience termination of services or undue errors. Please comply with new server requirements and read through the attached privacy policy. Wondering why you go this email? This email was sent automatically during routine security checks. We are trying to protect your account so you can continue using services uninterrupted. Thanks, Webmail Master ©2017 Webmail Domain Subject: Urgent Email From: Webmail Master Security (webmastersecurity@webmail.com) Improper use of copyright Watch for improper use of copyright information. This is used to make the phishing email look official. Unnecessary urgency Use your intuition and if something 'feels' wrong, consider calling the organization or office directly to validate the email. Types of Social Engineering Online communications or emails designed to lure individuals into providing sensitive information. Tip: When in doubt, throw it out. If an email looks suspicious, contact the organization/individual directly to validate the legitimacy of the email. You can also report the email to your email provider’s IT Security department. An act of wrongfully obtaining and using another person’s information that involves fraud or deception. Tip: Be diligent before posting personal information online and think carefully before sharing information through apps and websites. Identity Theft:Phishing: A type of malware that prevents or limits users from accessing their system or select files, unless a ransom is paid to restore access. Tip: Be proactive and protect against data loss by backing up your files and keeping them safe on a physical, external storage device. Ransomware: For more information and tips to stay safe online throughout the year, visit: https://www.dhs.gov/ncsam Cyber crime is a critical threat with social engineering attacks becoming more sophisticated, realistic, and difficult to recognize. Phishing attacks are one of the most common forms of cyber crime. What does a phishing email look like? Review the example below for characteristics of a phishing scam disguised to look like a legitimate email.
  • 3. DON’T GET REELED IN. Phishing is a scam by which an email user is duped into revealing personal or confidential information that the scammer can use illicitly or fraudulently. PHISHING PREVENTION 101 Secure yourself from fraud and phishing attempts by: • Turning off the option to automatically download attachments • Saving and scanning any attachments before opening them • Before providing any kind of information, call and verify with the source that they are indeed the ones who sent the email or message For more information on phishing visit: http://www.cdse.edu/toolkits/cybersecurity
  • 4. • Do not open attachments or click on links from untrusted sources • Never send personal information in an email • Keep your firewall and antivirus software updated CYBER SECURITY IS OUR SHARED RESPONSIBILITY DON’T TAKE THE BAIT
  • 5. CONNECT WITH CARE • Keep your devices updated with the latest system and application patches • Assume that Wi-Fi connections are not secure, since many Wi-Fi hotspots don’t encrypt the information you send • Do not log into financial accounts or other sensitive accounts when using public Wi-Fi networks • Consider turning off features on your computer or mobile devices that allow you to automatically connect to Wi-Fi CYBER SECURITY IS OUR SHARED RESPONSIBILITY
  • 7. CYBER SECURITY IS OUR SHARED RESPONSIBILITY PROTECT YOUR SMART PHONE • Make sure the OS and software are up to date at all times • Download apps from reputable sites and closely review permission requests • Make sure to check the feedback from other users before installing the program from an app store • Use a strong,complex password • Use a security app,if available for your device • Turn off Bluetooth and other connections when not in use • Jailbreak your phone • Download apps from third- party app stores and sites • Leave your mobile device unattended in public places • Enable your“Wi-Fi ad-hoc mode” DO’S DON’TS
  • 8. KEEP YOUR PASSWORD SAFE BY FOLLOWING THESE EASY TIPS: DEVELOP strong passwords that use a combination of words, numbers, symbols, and both upper- and lower-case letters CREATEa password phrase and make it relevant. If you’re joining a shopping site for example, think “About to Use Shopping Site” and use “ABT2_uz_$h0pping” USE different passwords for every unique account, such as work, banking, and email DISABLE the “save password” feature in your Internet browser CYBER SECURITY IS OUR SHARED RESPONSIBILITY USE SECURE PASSWORDS