1
Illinois Department of Illinois Department of Innovation Innovation & Technology Technology Division of Information Security State of Illinois Department of Innovation & Technology What is Phishing? Phishing (pronounced fishing) is a type of deception or fraud that uses e-mail messages, websites or phone calls to dishonestly exploit sensitive information from you OR install malicious software on your computer. What does an email Phishing scam look like? Attackers tend to create deceptive e-mails that look legitimate by: Making the email appear to be from someone you know Coming from trustworthy companies that you do business with Using official looking logos and graphics that appear to be connected to legitimate websites, but actually takes you to phony scam sites Attempting to bring an emotional reaction from you that causes you to click in haste on a link or attachment. Examples include: - Your Tax return was not successfully filed - Your shipment was returned - Your PayPal account needs to be verified to issue pending account credit - Negative eBay feedback has been received, click here to protest - Please verify your account - Click here to gain access to your account Why is Phishing awareness so important? Phishing is the #1 action that threat actors (the bad guys) use to cause or contribute to an incident. Phishing is the destructive doorway that is used in the vast majority of cyber breaches. This means when a breach occurs, it is likely because a user clicked on a phishing link or attachment. Therefore it very important that we learn to safe-guard ourselves from Phishing attacks. ENCRYPTION SECURITY AWARENESS BEST PRACTICES For more information on this topic, visit: StaySafeOnline.org SIMPLE SIGNS OF A PHISHING EMAIL The email has poor spelling or grammar. For secure transactions, look for a lock icon in the URL. The email uses threats or offers incredible deals. The URL does not match that of the legitimate site. Scammers will tweak the address of their spoofed website so that at a quick glance it looks legitimate. The URL may use a different domain name (e.g., .com vs .net) than the legitimate site. The URL may use variations of the spelling of the actual address. Beware of attachments. Phishing Cybersecurity’s Top Threat www.DoIT.illinois.gov IOCI 17-240 Printed by Authority of the State of Illinois 11/16

Division of Information Security Phishing...Why is Phishing awareness so important? Phishing is the #1 action that threat actors (the bad guys) use to cause or contribute to an incident

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Division of Information Security Phishing...Why is Phishing awareness so important? Phishing is the #1 action that threat actors (the bad guys) use to cause or contribute to an incident

Illinois Department ofIllinois Department of

Innovation Innovation && Technology Technology

Division of Information SecurityState of IllinoisDepartment of Innovation & Technology

What is Phishing?Phishing (pronounced fishing) is a type of deception or fraud that uses e-mail messages, websites or phonecalls to dishonestly exploit sensitive information from you OR install malicious software on your computer.

What does an email Phishing scam look like?Attackers tend to create deceptive e-mails that look legitimate by:• Making the email appear to be from someone you know• Coming from trustworthy companies that you do business with• Using official looking logos and graphics that appear to be connected to legitimate websites, but actuallytakes you to phony scam sites

• Attempting to bring an emotional reaction from you that causes you to click in haste on a link orattachment. Examples include:

- Your Tax return was not successfully filed - Your shipment was returned - Your PayPal account needs to be verified to issue pending account credit - Negative eBay feedback has been received, click here to protest - Please verify your account - Click here to gain access to your account

Why is Phishing awareness so important?Phishing is the #1 action that threat actors (the bad guys) use to cause or contribute to an incident. Phishingis the destructive doorway that is used in the vast majority of cyber breaches. This means when a breachoccurs, it is likely because a user clicked on a phishing link or attachment. Therefore it very important that welearn to safe-guard ourselves from Phishing attacks.

ENCRYPTION SECURITY AWARENESS BEST PRACTICES

For more information on this topic, visit:StaySafeOnline.org

SIMPLE SIGNS OFA PHISHING EMAIL• The email has poor spelling orgrammar.

• For secure transactions, look for alock icon in the URL.

• The email uses threats or offersincredible deals.

• The URL does not match that of thelegitimate site. Scammers will tweakthe address of their spoofed websiteso that at a quick glance it lookslegitimate.

• The URL may use a different domainname (e.g., .com vs .net) than thelegitimate site.

• The URL may use variations of thespelling of the actual address.

• Beware of attachments.

Phishing Cybersecurity’s

Top Threat

www.DoIT.illinois.govIOCI 17-240 Printed by Authority of the State of Illinois 11/16