SlideShare a Scribd company logo
PhishingScams:8HelpfulTipstoKeepYouSafe
Identifyand
Preventthe
RisingForceof
PhishingAttacks
When we think of hackers and cyber criminals, we tend to think of
them as masterminds wearing hoodies, shutting down websites with
their out-of-this-world coding skills (and godly swagger of course!).
Well, that’s not always the case.
Using a simple yet highly impactful technique like Email Phishing, any
Tom, Dick, or Harry can fool users to commit online fraud.
You don’t need to learn a dozen coding languages to employ phishing
scams and take control of systems.
A huge part of the reason that phishing is so popular is its lack of
sophistication.
WhatisPhishing?
• You may not understand the term ‘Phishing’, but chances
are, you would at least have heard of it.
• The thing about Phishing is that you may have fallen its
victim without even realizing it.
• Basically, it is a con trick.
• In the email phishing method, the perpetrators send
malicious links, viruses, malware, and detrimental files via
fake messages, popups etc.
Phishing
These emails often show lucrative offers, lotteries, discounts
or they may act like an urgent action needs to be taken in the
form of a password change or an email confirmation.
On clicking the mischievous link, the user is redirected to a
malicious website which can ultimately lead to disasters.
An example of such email phishing has been demonstrated in
the image below.
Here, it looks as if the email has been sent by Amazon, but it
hasn’t been.
If a user misses the tiny details pointed out and clicks it, they
are now at the mercy of their attackers.
Phishing Email Example
PhishingStatistics
From a cyber criminal’s point
of view, phishing works like a
charm. As a result, they have
started widening their phishing
net as much as possible.
There has been a rampant rise
in the number of phishing
scams worldwide. Let’s have a
look at the numbers involved.
Phishing Statistics
Around 85% of
Organizations fall prey
to Phishing attacks.
Almost 30% of phishing
emails are opened by
the users.
Email attachments are
the number one
medium to deliver
malware.
The average cost of a
spear-phishing attack is
$1.6 million.
One in every three
companies has reported
being the victim of CEO
fraud emails (also
known as whaling).
2016 saw a record
number of phishing
attacks.
A report conducted by
IBM reported a 6000%
rise in Ransomware-
infected files.
How to spot a Phishing
email?
 If identifying phishing emails was an easy task,
there wouldn’t be so many victims.
 Unfortunately, it isn’t.
 However, that doesn’t mean that you need
Sherlock Holmes’s deduction skills to figure it
out.
 Granted, these tricksters are pretty good at the
art of conning.
 Nonetheless, if you pay a little attention, you
can avoid being the next victim.
Identifying a Phishing Attack
Fake Email ID
1
Grammatical
Errors
2
No HTTPS
3
No images or
logos
4
Unrealistic
offers/discounts
5
1. Fake Email ID
 Cyber criminals send emails that attempt to make
you believe that they are from a legitimate,
trusted organization.
 These messages may even include an original
logo along with accurate headers and footers.
 However, it comes with a catch.
 The fraudsters may use the original logo, proper
images, and thousand other things, but they
cannot use the official email address of the
company.
 That would be extremely difficult to accomplish.
 This is where you can identify the threat and slam
the door in these imposters’ faces.
 Next time you receive an email, make sure you
check the email ID of the sender.
2. Grammatical Errors
• We know that you are probably not a
stickler for grammar, well, neither are the
perpetrators behind fraud emails.
• More often than not, these emails are
comprised of some really silly grammatical
mistakes.
• Spotting these mistakes is not rocket
science by any means.
• Spot them, dodge them!
3. No HTTPS
• Reputed organizations such as PayPal must
employ a secure connection between the client
and the server to carry out transactions (in
PayPal’s case it’s actually a matter of PCI
compliance).
• An SSL certificate must be installed on its
website.
• If a fraud email has been sent to you, most of
the time the redirected website won’t have
HTTPS as the prefix in the URL.
• That’s a dead giveaway.
4. No images or logos
• Most of the times, phishing emails are written
in HTML.
• As a result, these emails are found in text
format only.
• They don’t have any logos or images
whatsoever.
5. Unrealistic
offers/discounts
• The word phishing has its roots
in the word fishing.
• How do you catch a fish?
• You give it a bait, right?
• Well, this is exactly what cyber
criminals do.
• If you see an offer or a scheme
that is too good to be true, it
probably is.
• Don’t fall for it. IT’S A TRAP!
Tipstoprotect
againstphishing
scams
• No matter how much attention we pay,
sometimes we might miss a tiny detail. This can
be enough to shut down your entire
organization’s systems (no pressure, right?).
Therefore, it is always recommended to have a
fool-proof plan in place. Here are our tips to steer
clear of phishing scams.
Protectyourselfagainstphishingscams
1
Improve your
computer
security
2
Keep your
system up-to-
date
3
Stay away from
Popups
4
Keep checking
your bank
account
statement
5
Enter your
personal
information in
HTTPS-enabled
website only
6
Avoid clicking on
links from emails
7
Avoid entering
personal
information via
public networks
8
Report a
phishing scam
ASAP
1.Improveyour
computersecurity
• Whether you want to guard against phishing
attacks or ransomware attacks or any other attack
for that matter, improving your computer security
should be on top of the list. This can be executed by
deploying a firewall, anti-virus, spam filters, anti-
spyware etc.
2.Keepyoursystemup-
to-date
The updates exist for a reason—improvement.
The developers keep rolling out updates every
other day to remove the bugs and
vulnerabilities present in past versions. So,
keep updating all software including your
operating system (OS).
3.Stayawayfrom
Popups
• DO NOT click on the links given in
a popup.
• DO NOT share any of your
personal information in a popup.
• In short, don’t do anything on the
popup. Stay Away!!
4.KeepcheckingyourBank
AccountStatement
In order to prevent any thefts,
keep checking your bank
account on a regular basis to
ensure that there aren’t any
unauthorized, illegitimate
transactions.
5.EnteryourpersonalinformationinHTTPS-enabled
websiteonly
You may be aware of the fact that
there are two communication
protocols —HTTP and HTTPS. The
‘S’ in HTTPS stands for Security.
Therefore, any data you enter, any
transaction you make is
safeguarded by means of an SSL
certificate.
6.Avoidclickingonlinksfromemails
This is one of the most widely used
technique to fool the users and
making them fall into the trap.
Even if you receive a mail saying
that a person wants to be friends
with you on a social media
platform, don’t click on the link.
Instead, go to the social media site
manually.
7.Avoidenteringpersonal
informationviapublicnetworks
• When you are connected to a public
network, you are at the highest point of
vulnerability. Even 12-year old Billy could creep
into your device after watching a couple videos
on YouTube and downloading an app. You
certainly don’t want that, do you?
8.Reportaphishing
scamASAP
If you are able to figure out a
phishing scam, report it straight
away. Ignorance is certainly not an
option here. Where do you report it?
First of all, report it to your email
service provider. The service provider
will stop the phishing emails from
circulating. You should also report to
the organization being targeted. For
example, if you receive a spoof email
from Amazon, then you should
report it to Amazon.
Final Words
What do you do when you are in front of a con
artist? You pay attention. All they want is to
sidetrack us and gain the advantage of that single
moment of distraction. Don’t worry. Be aware,
take the preventive measures and you should be
fine.
Related
Resources
• Phishing by the Numbers: Must-Know Phishing
Statistics
• Why US Senate adopts HTTPS encryption?
• Tools for Business in the Battle against
Cyberattacks

More Related Content

PPTX
PPT on Phishing
PPTX
Anti phishing presentation
PPT
Cyber Security and Cyber Awareness
PPTX
Email phishing and countermeasures
PPTX
Phishing awareness
PPTX
PCI DSS 4.0 Webinar Final.pptx
PPTX
Hacking & its types
PPSX
Complete C++ programming Language Course
PPT on Phishing
Anti phishing presentation
Cyber Security and Cyber Awareness
Email phishing and countermeasures
Phishing awareness
PCI DSS 4.0 Webinar Final.pptx
Hacking & its types
Complete C++ programming Language Course

What's hot (20)

PPTX
Different Types of Phishing Attacks
PPTX
Phishing
PPT
Phishing
PPTX
Phishing attack
PPT
P H I S H I N G
PDF
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
PPT
Phishing
PPTX
What is Phishing and How can you Avoid it?
PPT
Phishing attacks ppt
PPTX
Phishing Awareness Training.pptx
PPTX
Phishing techniques
PPTX
Information Security Awareness Training Open
PPTX
Phishing Attacks
PPTX
PHISHING attack
PPTX
Phishing Presentation
PPTX
PDF
Cyber Security Awareness
PPTX
Phishing attack, with SSL Encryption and HTTPS Working
PPTX
Different types of attacks in internet
PPTX
Phising a Threat to Network Security
Different Types of Phishing Attacks
Phishing
Phishing
Phishing attack
P H I S H I N G
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
Phishing
What is Phishing and How can you Avoid it?
Phishing attacks ppt
Phishing Awareness Training.pptx
Phishing techniques
Information Security Awareness Training Open
Phishing Attacks
PHISHING attack
Phishing Presentation
Cyber Security Awareness
Phishing attack, with SSL Encryption and HTTPS Working
Different types of attacks in internet
Phising a Threat to Network Security
Ad

Viewers also liked (20)

PDF
Social Networks And Phishing
PDF
DNS High-Availability Tools - Open-Source Load Balancing Solutions
ODP
DerbyCon 7.0 Legacy: Regular Expressions (Regex) Overview
PDF
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
PDF
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
PDF
Scripting and automation with the Men & Mice Suite
PDF
Role of DNS in Botnet Command and Control
PDF
Symantec (ISTR) Internet Security Threat Report Volume 22
ODP
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
PPTX
Tcp udp
PPTX
Cyber Security # Lec 2
ODP
OISF: Regular Expressions (Regex) Overview
PDF
How to send DNS over anything encrypted
PPTX
Microsoft Cyber Security IT-Camp
PDF
Dns Hardening Linux Os
PDF
Umbrella Webcast: Redefining Security for the Nomadic Worker
PDF
Windows Server 2016 Webinar
PDF
Cisco Connect Toronto 2017 - Anatomy-of-attack
PPTX
Cyber crime & security
PDF
Cisco umbrella overview
Social Networks And Phishing
DNS High-Availability Tools - Open-Source Load Balancing Solutions
DerbyCon 7.0 Legacy: Regular Expressions (Regex) Overview
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Scripting and automation with the Men & Mice Suite
Role of DNS in Botnet Command and Control
Symantec (ISTR) Internet Security Threat Report Volume 22
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
Tcp udp
Cyber Security # Lec 2
OISF: Regular Expressions (Regex) Overview
How to send DNS over anything encrypted
Microsoft Cyber Security IT-Camp
Dns Hardening Linux Os
Umbrella Webcast: Redefining Security for the Nomadic Worker
Windows Server 2016 Webinar
Cisco Connect Toronto 2017 - Anatomy-of-attack
Cyber crime & security
Cisco umbrella overview
Ad

Similar to Phishing Scams: 8 Helpful Tips to Keep You Safe (20)

PDF
Cybercrime - An essential guide from Thawte
PDF
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
PDF
11 Cybersecurity Tips to stay safe online
PPTX
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
PPTX
IS Presetation.pptx
PPT
Train Employees to Avoid Inadvertent Cyber-Security Breaches
PDF
Phishing 101: Part-1 Blog Welcome to this Phishing Blog Part1.
PPTX
Are Phishing Attacks Angling For You?
DOCX
negative implications of IT
PDF
phishing facts be aware and do not take the bait
PPTX
Phishing technology
PPTX
Phishing technology
PPTX
Phishing technology
PPSX
IDENTIFYING CYBER THREATS NEAR YOU
PDF
10 tips to prevent phishing attacks
ODP
The Net is Dangerous
PPTX
Cyber_Security_Awareness_Presentation.pptx
PPTX
IP SPOOFING &-.pptx
PPTX
StayVigilantProtectYourEmailAccount.pptx
DOCX
Final paper
Cybercrime - An essential guide from Thawte
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
11 Cybersecurity Tips to stay safe online
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
IS Presetation.pptx
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Phishing 101: Part-1 Blog Welcome to this Phishing Blog Part1.
Are Phishing Attacks Angling For You?
negative implications of IT
phishing facts be aware and do not take the bait
Phishing technology
Phishing technology
Phishing technology
IDENTIFYING CYBER THREATS NEAR YOU
10 tips to prevent phishing attacks
The Net is Dangerous
Cyber_Security_Awareness_Presentation.pptx
IP SPOOFING &-.pptx
StayVigilantProtectYourEmailAccount.pptx
Final paper

More from CheapSSLsecurity (20)

PPTX
What is Asymmetric Encryption? Understand with Simple Examples
PPTX
TLS 1.3: Everything You Need to Know - CheapSSLsecurity
PPTX
How to Fix ERR_SSL_VERSION_OR_CIPHER_MISMATCH Error
PPTX
Apache Server: Common SSL Errors and Troubleshooting Guide
PPTX
Multi Domain Wildcard Features explained by CheapSSLsecurity
PPTX
Various Types of OpenSSL Commands and Keytool
PPTX
What is Certificate Transparency (CT)? How does it work?
PDF
Norton Cyber Security Insights Report 2017
PPTX
The Top Five Cybersecurity Threats for 2018
PPTX
Is your business PCI DSS compliant? You’re digging your own grave if not
PPTX
How Hashing Algorithms Work
PPTX
Quantum Computing vs Encryption: A Battle to Watch Out for
PPTX
Hashing vs Encryption vs Encoding
PDF
Understanding SSL Certificate for Apps by Symantec
PPTX
Thawte Wildcard SSL Certificates – Enable Sub-Domains Security
PPTX
Shift to HTTPS and Save Your Website from the Wrath of Blacklisting
PPTX
Microsoft Exchange Server & SSL Certificates: Everything you need to know
PPTX
Why Green Address Bar EV SSL Certificates are Critical to E-commerce
PPTX
4 Major Reasons for Big Organizations to Have Wildcard SSL Certificates
PDF
Comodo: The Benefits of EV SSL Certificates - CheapSSLsecurity
What is Asymmetric Encryption? Understand with Simple Examples
TLS 1.3: Everything You Need to Know - CheapSSLsecurity
How to Fix ERR_SSL_VERSION_OR_CIPHER_MISMATCH Error
Apache Server: Common SSL Errors and Troubleshooting Guide
Multi Domain Wildcard Features explained by CheapSSLsecurity
Various Types of OpenSSL Commands and Keytool
What is Certificate Transparency (CT)? How does it work?
Norton Cyber Security Insights Report 2017
The Top Five Cybersecurity Threats for 2018
Is your business PCI DSS compliant? You’re digging your own grave if not
How Hashing Algorithms Work
Quantum Computing vs Encryption: A Battle to Watch Out for
Hashing vs Encryption vs Encoding
Understanding SSL Certificate for Apps by Symantec
Thawte Wildcard SSL Certificates – Enable Sub-Domains Security
Shift to HTTPS and Save Your Website from the Wrath of Blacklisting
Microsoft Exchange Server & SSL Certificates: Everything you need to know
Why Green Address Bar EV SSL Certificates are Critical to E-commerce
4 Major Reasons for Big Organizations to Have Wildcard SSL Certificates
Comodo: The Benefits of EV SSL Certificates - CheapSSLsecurity

Recently uploaded (20)

PDF
NewMind AI Monthly Chronicles - July 2025
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Cloud computing and distributed systems.
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Monthly Chronicles - July 2025
“AI and Expert System Decision Support & Business Intelligence Systems”
Chapter 3 Spatial Domain Image Processing.pdf
Electronic commerce courselecture one. Pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
20250228 LYD VKU AI Blended-Learning.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
NewMind AI Weekly Chronicles - August'25 Week I
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Big Data Technologies - Introduction.pptx
MYSQL Presentation for SQL database connectivity
Empathic Computing: Creating Shared Understanding
Cloud computing and distributed systems.
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Diabetes mellitus diagnosis method based random forest with bat algorithm
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Digital-Transformation-Roadmap-for-Companies.pptx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

Phishing Scams: 8 Helpful Tips to Keep You Safe

  • 2. Identifyand Preventthe RisingForceof PhishingAttacks When we think of hackers and cyber criminals, we tend to think of them as masterminds wearing hoodies, shutting down websites with their out-of-this-world coding skills (and godly swagger of course!). Well, that’s not always the case. Using a simple yet highly impactful technique like Email Phishing, any Tom, Dick, or Harry can fool users to commit online fraud. You don’t need to learn a dozen coding languages to employ phishing scams and take control of systems. A huge part of the reason that phishing is so popular is its lack of sophistication.
  • 3. WhatisPhishing? • You may not understand the term ‘Phishing’, but chances are, you would at least have heard of it. • The thing about Phishing is that you may have fallen its victim without even realizing it. • Basically, it is a con trick. • In the email phishing method, the perpetrators send malicious links, viruses, malware, and detrimental files via fake messages, popups etc.
  • 4. Phishing These emails often show lucrative offers, lotteries, discounts or they may act like an urgent action needs to be taken in the form of a password change or an email confirmation. On clicking the mischievous link, the user is redirected to a malicious website which can ultimately lead to disasters. An example of such email phishing has been demonstrated in the image below. Here, it looks as if the email has been sent by Amazon, but it hasn’t been. If a user misses the tiny details pointed out and clicks it, they are now at the mercy of their attackers.
  • 6. PhishingStatistics From a cyber criminal’s point of view, phishing works like a charm. As a result, they have started widening their phishing net as much as possible. There has been a rampant rise in the number of phishing scams worldwide. Let’s have a look at the numbers involved.
  • 7. Phishing Statistics Around 85% of Organizations fall prey to Phishing attacks. Almost 30% of phishing emails are opened by the users. Email attachments are the number one medium to deliver malware. The average cost of a spear-phishing attack is $1.6 million. One in every three companies has reported being the victim of CEO fraud emails (also known as whaling). 2016 saw a record number of phishing attacks. A report conducted by IBM reported a 6000% rise in Ransomware- infected files.
  • 8. How to spot a Phishing email?  If identifying phishing emails was an easy task, there wouldn’t be so many victims.  Unfortunately, it isn’t.  However, that doesn’t mean that you need Sherlock Holmes’s deduction skills to figure it out.  Granted, these tricksters are pretty good at the art of conning.  Nonetheless, if you pay a little attention, you can avoid being the next victim.
  • 9. Identifying a Phishing Attack Fake Email ID 1 Grammatical Errors 2 No HTTPS 3 No images or logos 4 Unrealistic offers/discounts 5
  • 10. 1. Fake Email ID  Cyber criminals send emails that attempt to make you believe that they are from a legitimate, trusted organization.  These messages may even include an original logo along with accurate headers and footers.  However, it comes with a catch.  The fraudsters may use the original logo, proper images, and thousand other things, but they cannot use the official email address of the company.  That would be extremely difficult to accomplish.  This is where you can identify the threat and slam the door in these imposters’ faces.  Next time you receive an email, make sure you check the email ID of the sender.
  • 11. 2. Grammatical Errors • We know that you are probably not a stickler for grammar, well, neither are the perpetrators behind fraud emails. • More often than not, these emails are comprised of some really silly grammatical mistakes. • Spotting these mistakes is not rocket science by any means. • Spot them, dodge them!
  • 12. 3. No HTTPS • Reputed organizations such as PayPal must employ a secure connection between the client and the server to carry out transactions (in PayPal’s case it’s actually a matter of PCI compliance). • An SSL certificate must be installed on its website. • If a fraud email has been sent to you, most of the time the redirected website won’t have HTTPS as the prefix in the URL. • That’s a dead giveaway.
  • 13. 4. No images or logos • Most of the times, phishing emails are written in HTML. • As a result, these emails are found in text format only. • They don’t have any logos or images whatsoever.
  • 14. 5. Unrealistic offers/discounts • The word phishing has its roots in the word fishing. • How do you catch a fish? • You give it a bait, right? • Well, this is exactly what cyber criminals do. • If you see an offer or a scheme that is too good to be true, it probably is. • Don’t fall for it. IT’S A TRAP!
  • 15. Tipstoprotect againstphishing scams • No matter how much attention we pay, sometimes we might miss a tiny detail. This can be enough to shut down your entire organization’s systems (no pressure, right?). Therefore, it is always recommended to have a fool-proof plan in place. Here are our tips to steer clear of phishing scams.
  • 16. Protectyourselfagainstphishingscams 1 Improve your computer security 2 Keep your system up-to- date 3 Stay away from Popups 4 Keep checking your bank account statement 5 Enter your personal information in HTTPS-enabled website only 6 Avoid clicking on links from emails 7 Avoid entering personal information via public networks 8 Report a phishing scam ASAP
  • 17. 1.Improveyour computersecurity • Whether you want to guard against phishing attacks or ransomware attacks or any other attack for that matter, improving your computer security should be on top of the list. This can be executed by deploying a firewall, anti-virus, spam filters, anti- spyware etc.
  • 18. 2.Keepyoursystemup- to-date The updates exist for a reason—improvement. The developers keep rolling out updates every other day to remove the bugs and vulnerabilities present in past versions. So, keep updating all software including your operating system (OS).
  • 19. 3.Stayawayfrom Popups • DO NOT click on the links given in a popup. • DO NOT share any of your personal information in a popup. • In short, don’t do anything on the popup. Stay Away!!
  • 20. 4.KeepcheckingyourBank AccountStatement In order to prevent any thefts, keep checking your bank account on a regular basis to ensure that there aren’t any unauthorized, illegitimate transactions.
  • 21. 5.EnteryourpersonalinformationinHTTPS-enabled websiteonly You may be aware of the fact that there are two communication protocols —HTTP and HTTPS. The ‘S’ in HTTPS stands for Security. Therefore, any data you enter, any transaction you make is safeguarded by means of an SSL certificate.
  • 22. 6.Avoidclickingonlinksfromemails This is one of the most widely used technique to fool the users and making them fall into the trap. Even if you receive a mail saying that a person wants to be friends with you on a social media platform, don’t click on the link. Instead, go to the social media site manually.
  • 23. 7.Avoidenteringpersonal informationviapublicnetworks • When you are connected to a public network, you are at the highest point of vulnerability. Even 12-year old Billy could creep into your device after watching a couple videos on YouTube and downloading an app. You certainly don’t want that, do you?
  • 24. 8.Reportaphishing scamASAP If you are able to figure out a phishing scam, report it straight away. Ignorance is certainly not an option here. Where do you report it? First of all, report it to your email service provider. The service provider will stop the phishing emails from circulating. You should also report to the organization being targeted. For example, if you receive a spoof email from Amazon, then you should report it to Amazon.
  • 25. Final Words What do you do when you are in front of a con artist? You pay attention. All they want is to sidetrack us and gain the advantage of that single moment of distraction. Don’t worry. Be aware, take the preventive measures and you should be fine.
  • 26. Related Resources • Phishing by the Numbers: Must-Know Phishing Statistics • Why US Senate adopts HTTPS encryption? • Tools for Business in the Battle against Cyberattacks