
Phishing Onboarding Micro Workshop
Presentation
•
Computers
•
Professional Development
•
Practice Problem
•
Hard
Saamiya Cumberbatch
Used 4+ times
FREE Resource
14 Slides • 0 Questions
1
Phishing Micro Workshop 101
Welcome to our Mandatory Onboarding Exercise!
It is important you take this exercise seriously as the knowledge will help protect you and our company from potential attacks.
Important
Note
2
A cybercrime which uses fraudulent emails, text messages or calls to solicit personal information with the intention of malicious gain.
What is Phishing?
3
Spear Phishing
Vishing
Smishing
Whaling
Types of Phishing
4
Spear Phishing
A highly targeted cyberattack which is extremely effective and difficult to prevent. Spear phishing is often done with the intent of stealing sensitive data like financial details via accessing the target's personal information through social media.
Spear phishing requires alot of thought and meticulous planning which aid in the attack's success. Spear phishing targets a specific individual.
5
A phishing tactic using a SMS text messages to ascertain personal information.
SMS Phishing
A phishing tactic using a phone call or voice message to ascertain personal information.
Voice Phishing
Vishing Smishing
6
Masquerading as a senior player at an organization and directly targeting other important individuals at an organization, with the aim of stealing money or sensitive information or gaining access to computer systems for criminal purposes.
Whaling
7
Think of phishing as casting a wide net in the ocean and waiting to see how many fish you can catch.
What are the Differences?
In the case of spear phishing, think of studying a very specific fish in the ocean and becoming an expert to ensure that when you cast your net in a specific place at a specific time, based on your knowledge, you are more likely to catch that specific fish.
Phishing uses a blanket approach whereas spear phishing and whaling use an individual approach.
With whaling, think of studying the queen bee of the hive's movements and setting a trap specifically geared at capturing her.
8
Too good to be true
Sense of urgency
Hyperlinks
Attachments
Unusual sender
Features of Phishing
"Congrats, you've won a huge prize. Please send me your info so I may send the prize."
Example of Phishing
9
Common Phishing Techniques
Using legitimate links
Altering brand logos
Mixing legitimate and poisoned code together
Abusing redirections and URL shorteners
Puzzling the filters with too much noise or too little content
10
Keep software up to date
Check URL addresses
Install anti-phishing toolbars
Never download suspicious attachments
Be cautious when reacting to emails
How to Avoid being Phished
11
When you click on a phishing link, you may be redirected to a page that asks you to enter your personal information and/or download an attachment
What Happens
12
So you think you're being phished?
Report attack to the IT Department
Do NOT click on the links or downloadable attachments
If via email, report the email as spam
Do NOT give out your personal information such as name, address, contact and banking details
If credit card information was entered, cancel your card
Change all passwords of compromised accounts
13
Test Your Knowledge!
On the next slide is a direct link to the Quizizz Quiz associated with this lesson. Click "Start Quiz" to test your knowledge.
Don't worry, if you get a question wrong you can always go back later and review the question and its correct answer. You also have unlimited attempts so you can always retake it after.
*Each employee is required to successfully pass a phishing quiz in addition to attending an informational workshop once a year.
Good luck anti-phishers!
14
Phishing Micro Workshop 101
Welcome to our Mandatory Onboarding Exercise!
It is important you take this exercise seriously as the knowledge will help protect you and our company from potential attacks.
Important
Note
Show answer
Auto Play
Slide 1 / 14
SLIDE
Similar Resources on Wayground
12 questions
Encryption
Presentation
•
KG - Professional Dev...
8 questions
Selenium- Locators Java
Presentation
•
Professional Development
10 questions
Quiz : Literature Review
Presentation
•
University
10 questions
Daily Routines
Presentation
•
University
11 questions
Electromagnet and Magnetism Recap
Presentation
•
8th Grade
13 questions
C4 W4 D 1
Presentation
•
Professional Development
10 questions
C4 W3 D2
Presentation
•
Professional Development
11 questions
Le verbe Etre au présent
Presentation
•
KG
Popular Resources on Wayground
16 questions
Grade 3 Simulation Assessment 2
Quiz
•
3rd Grade
19 questions
HCS Grade 5 Simulation Assessment_1 2526sy
Quiz
•
5th Grade
10 questions
Cinco de Mayo Trivia Questions
Interactive video
•
3rd - 5th Grade
17 questions
HCS Grade 4 Simulation Assessment_2 2526sy
Quiz
•
4th Grade
24 questions
HCS Grade 5 Simulation Assessment_2 2526sy
Quiz
•
5th Grade
13 questions
Cinco de mayo
Interactive video
•
6th - 8th Grade
20 questions
Math Review
Quiz
•
3rd Grade
30 questions
GVMS House Trivia 2026
Quiz
•
6th - 8th Grade