SlideShare a Scribd company logo
2
Most read
3
Most read
6
Most read
PROTECTING
YOURSELF
FROM
PHISHING
ATTACKS
Hajar Bouchriha
Code Alpha
INTRODUCTION
• Phishing, is a common threat, involves impersonation to obtain
sensitive information, often passwords.
• Attackers use deceptive links and attachments, costing companies
millions and risking employee safety.
• Our goal is to keep both the business and the staff safe from
harm.
Website Phishing Email Phishing
TYPES OF PHISHING ATTACKS
Manipulating individuals to
divulge confidential
information.
Examples: Impersonation,
emotional manipulation.
Fraudulent websites
imitating legitimate ones.
Examples: Fake login pages,
malicious websites.
Deceptive emails to extract
information.
Examples: Fake security alerts,
account verification requests.
Social Engineering
COMMON CHARACTERISTICS OF PHISHING ATTEMPTS
• Urgency: Creating a sense of immediate action.
• Unexpected Emails: Receiving unsolicited emails.
• Suspicious Links: Hover over links to preview URLs
• Requests for Personal Information: Be cautious.
RECOGNIZING PHISHING EMAILS
Verify Email
Content.
Hover Over Links to
Preview URLs.
Check the Sender's
Email Address.
Look for Spelling and
Grammar Mistakes.
RECOGNIZING PHISHING WEBSITES
Verify Website Legitimacy.
Be Cautious with Pop-Up
Forms.
Check the URLs.
Look for HTTPS.
SOCIAL ENGINEERING TACTICS
Exploiting
Human Emotions.
Awareness of
Social Media
Manipulation.
Impersonation
Techniques.
Manipulation of
Trust.
PROTECTING PERSONAL INFORMATION
• Never Share Passwords via Email.
• Use Two-Factor Authentication.
• Verify Requests for Sensitive
Information.
• Be Cautious with Personal
Information Sharing.
BEST PRACTICES FOR AVOIDING PHISHING
● Keep software updated and use security software.
● Educate and train employees.
● Regularly backup important data.
CASE STUDIES
● Attack :
Global Enterprises fell victim to a phishing attack as
cybercriminals posed as a trusted vendor, deceiving
the finance department into urgently altering payment
details for an invoice. The undetected fraudulent
payment led to financial loss and strained vendor
relationships, only discovered when the legitimate
vendor inquired about the overdue payment.
● Lessons Learned :
Global Enterprises strengthened vendor payment
protocols with robust verifications and approvals.
They introduced role-specific phishing training for the
finance team, emphasizing red flag recognition and
trusted channels for payment verification.
FINAL WORDS
Phishing attacks will continue to happen in the future. It is up to the
organization and its employees to learn from past mistakes and not repeat them.
Employees can educate themselves on how to stop phishing emails.
Organizations can deploy the best phishing protection solutions to deal with
such situations effectively. Furthermore, organizations must include case
studies related to past incidents in the employee education
and training programs.
CREDITS: This presentation template was created by Slidesgo, and
includes icons by Flaticon and infographics & images by Freepik
I want to express my gratitude for your time and
active involvement in today's presentation, focusing
on safeguarding against phishing attacks. Your
engagement enhances our collective understanding
and commitment to strengthening cybersecurity
measures.
THANKS

More Related Content

PPTX
phishing-awareness-powerpoint.pptx
PPTX
Cybersecurity Awareness for employees.pptx
PPTX
Anti phishing presentation
PPTX
Phishing Scams: 8 Helpful Tips to Keep You Safe
PPTX
Different Types of Phishing Attacks
PPTX
PPT
Phishing
PPT
General Awareness On Cyber Security
phishing-awareness-powerpoint.pptx
Cybersecurity Awareness for employees.pptx
Anti phishing presentation
Phishing Scams: 8 Helpful Tips to Keep You Safe
Different Types of Phishing Attacks
Phishing
General Awareness On Cyber Security

What's hot (20)

PPTX
Information Security Awareness Training Open
PPSX
Security Awareness Training
PPTX
Information security awareness - 101
PDF
End-User Security Awareness
PPTX
Security Awareness Training.pptx
PPT
Phishing
PPTX
Employee Security Awareness Training
PDF
Security Awareness Training
PPTX
Cybersecurity Awareness Training
PDF
Cybersecurity Employee Training
PPTX
Phishing attack
PDF
Employee Security Awareness Program
PPT
Cyber Security and Cyber Awareness
PPTX
Hyphenet Security Awareness Training
PPTX
Cybersecurity Awareness
PDF
Security Awareness Training
PDF
Cyber Security Awareness
PPT
Employee Security Training[1]@
PDF
Cybersecurity Awareness Training Presentation v2021.08
PDF
Cybersecurity Awareness Training Presentation v1.3
Information Security Awareness Training Open
Security Awareness Training
Information security awareness - 101
End-User Security Awareness
Security Awareness Training.pptx
Phishing
Employee Security Awareness Training
Security Awareness Training
Cybersecurity Awareness Training
Cybersecurity Employee Training
Phishing attack
Employee Security Awareness Program
Cyber Security and Cyber Awareness
Hyphenet Security Awareness Training
Cybersecurity Awareness
Security Awareness Training
Cyber Security Awareness
Employee Security Training[1]@
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v1.3
Ad

Similar to Phishing Awareness Training.pptx (20)

PDF
90% of Data Breaches Start with Phishing—Here’s How to Protect Yourself.pdf
PDF
Understanding Phishing Malpractices in the Technology Sector and Their Ongoin...
PDF
A Deep Dive into Phishing Techniques and Countermeasures.pdf
PPTX
2016 Social Engineering Training
PDF
Phishing 101: Part-1 Blog Welcome to this Phishing Blog Part1.
PPTX
Phishing technology
PDF
Phishing 101: Part-2 Blog Welcome to this Phishing Blog Part2
PPTX
How I Will Phish You
PPTX
Phishing technology
PPTX
Phishing technology
PPTX
Potential presentation template Task 2 (3) (1).pptx
PDF
10 tips to prevent phishing attacks
PPTX
PHISHING ATTACKS. _. _.pptx[]
PPTX
Cyber Security PowerPoint Templates.pptx
PDF
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
PDF
PPTX
IS Presetation.pptx
PPTX
Phishing ppt
PPTX
Organizational Phishing Education
90% of Data Breaches Start with Phishing—Here’s How to Protect Yourself.pdf
Understanding Phishing Malpractices in the Technology Sector and Their Ongoin...
A Deep Dive into Phishing Techniques and Countermeasures.pdf
2016 Social Engineering Training
Phishing 101: Part-1 Blog Welcome to this Phishing Blog Part1.
Phishing technology
Phishing 101: Part-2 Blog Welcome to this Phishing Blog Part2
How I Will Phish You
Phishing technology
Phishing technology
Potential presentation template Task 2 (3) (1).pptx
10 tips to prevent phishing attacks
PHISHING ATTACKS. _. _.pptx[]
Cyber Security PowerPoint Templates.pptx
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
IS Presetation.pptx
Phishing ppt
Organizational Phishing Education
Ad

Recently uploaded (20)

PPTX
Pharma ospi slides which help in ospi learning
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
RMMM.pdf make it easy to upload and study
PPTX
master seminar digital applications in india
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Classroom Observation Tools for Teachers
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Institutional Correction lecture only . . .
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
Pharma ospi slides which help in ospi learning
Week 4 Term 3 Study Techniques revisited.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
RMMM.pdf make it easy to upload and study
master seminar digital applications in india
Supply Chain Operations Speaking Notes -ICLT Program
STATICS OF THE RIGID BODIES Hibbelers.pdf
Classroom Observation Tools for Teachers
Anesthesia in Laparoscopic Surgery in India
TR - Agricultural Crops Production NC III.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Institutional Correction lecture only . . .
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
O7-L3 Supply Chain Operations - ICLT Program
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Module 4: Burden of Disease Tutorial Slides S2 2025
102 student loan defaulters named and shamed – Is someone you know on the list?

Phishing Awareness Training.pptx

  • 2. INTRODUCTION • Phishing, is a common threat, involves impersonation to obtain sensitive information, often passwords. • Attackers use deceptive links and attachments, costing companies millions and risking employee safety. • Our goal is to keep both the business and the staff safe from harm.
  • 3. Website Phishing Email Phishing TYPES OF PHISHING ATTACKS Manipulating individuals to divulge confidential information. Examples: Impersonation, emotional manipulation. Fraudulent websites imitating legitimate ones. Examples: Fake login pages, malicious websites. Deceptive emails to extract information. Examples: Fake security alerts, account verification requests. Social Engineering
  • 4. COMMON CHARACTERISTICS OF PHISHING ATTEMPTS • Urgency: Creating a sense of immediate action. • Unexpected Emails: Receiving unsolicited emails. • Suspicious Links: Hover over links to preview URLs • Requests for Personal Information: Be cautious.
  • 5. RECOGNIZING PHISHING EMAILS Verify Email Content. Hover Over Links to Preview URLs. Check the Sender's Email Address. Look for Spelling and Grammar Mistakes.
  • 6. RECOGNIZING PHISHING WEBSITES Verify Website Legitimacy. Be Cautious with Pop-Up Forms. Check the URLs. Look for HTTPS.
  • 7. SOCIAL ENGINEERING TACTICS Exploiting Human Emotions. Awareness of Social Media Manipulation. Impersonation Techniques. Manipulation of Trust.
  • 8. PROTECTING PERSONAL INFORMATION • Never Share Passwords via Email. • Use Two-Factor Authentication. • Verify Requests for Sensitive Information. • Be Cautious with Personal Information Sharing.
  • 9. BEST PRACTICES FOR AVOIDING PHISHING ● Keep software updated and use security software. ● Educate and train employees. ● Regularly backup important data.
  • 10. CASE STUDIES ● Attack : Global Enterprises fell victim to a phishing attack as cybercriminals posed as a trusted vendor, deceiving the finance department into urgently altering payment details for an invoice. The undetected fraudulent payment led to financial loss and strained vendor relationships, only discovered when the legitimate vendor inquired about the overdue payment. ● Lessons Learned : Global Enterprises strengthened vendor payment protocols with robust verifications and approvals. They introduced role-specific phishing training for the finance team, emphasizing red flag recognition and trusted channels for payment verification.
  • 11. FINAL WORDS Phishing attacks will continue to happen in the future. It is up to the organization and its employees to learn from past mistakes and not repeat them. Employees can educate themselves on how to stop phishing emails. Organizations can deploy the best phishing protection solutions to deal with such situations effectively. Furthermore, organizations must include case studies related to past incidents in the employee education and training programs.
  • 12. CREDITS: This presentation template was created by Slidesgo, and includes icons by Flaticon and infographics & images by Freepik I want to express my gratitude for your time and active involvement in today's presentation, focusing on safeguarding against phishing attacks. Your engagement enhances our collective understanding and commitment to strengthening cybersecurity measures. THANKS