Search Header Logo
Phishing Email Training

Phishing Email Training

Assessment

Presentation

Professional Development

University

Practice Problem

Easy

Created by

Megan Hull-Burg

Used 8+ times

FREE Resource

62 Slides • 20 Questions

1

Phishing Emails

Donegal School District

media
media

2

Objectives

This unit is designed to help you achieve

the following objectives:

  1. Identify schools in Pennsylvania that have experienced a cyber incident.

  1. Recall the importance of identifying phishing emails.

  1. Identify the key differences between legitimate and phishing emails.

  1. Explain the difference between reporting and deleting phishing emails.

  1. Explain the steps of how to report a phishing email.

3

  1. Your district provided device (Windows laptop or Chromebook).

  2. How to navigate through this training.

  3. How to access your district provided email account.

  4. Determine if you prefer the web or desktop version of Microsoft Outlook.

  • The web version is accessed through the portal.

  • The desktop client is an application accessible from your start menu.

Prior Knowledge

To complete this training, you will need to be familiar with the following:

media
media

​Desktop Client application access

​web version access

4

media

Overview – Goal #1

Identify local school districts that have been involved in a cyber incident.

Access prior knowledge

(Answer this question before continuing)

Are you familiar with any school districts that have faced a cyber incident?

5

Open Ended

Question image

Are you familiar with any school districts that have faced a cyber incident? If yes, please provide details below.

6

Review the following terms

The next four slides contain four important terms, read the definitions and examples.

After these slides, you will be asked to categorize content by each of the terms.

7

“Information that can be used to distinguish or trace an individual’s identity—such as name, social security number, biometric data records—either alone or when combined with other personal or identifying information that is linked or linkable to a specific individual (e.g., date and place of birth, mother’s maiden name, etc.).” (Romine, 2022)

Personally Identifiable Information (PII)

Full name, home address, work and personal phone numbers, social security number, health records, academic records, medical records, behavioral records.

Definition

Example

media

8

“A technique for attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person.” (Nieles et al., 2017)

Phishing Email

Electronic messages that prompt the reader to provide Personally Identifiable Information (PII) in one way or another or attempt to get the reader to download a file containing malware.

Definition

Example

media

9

media

“Ransomware is a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files. A criminal group will then demand a ransom in exchange for decryption.” (A Guide to Ransomware, n.d.)

Ransomware

Altoona Area School District was the victim of a ransomware incident in December of 2021 in which threat actors exfiltrated 150 GB of district data, including student and employee data. (The K12 Cyber Incident Map, n.d.)

Definition

Example

10

“A data leak is when information is exposed to unauthorized people due to internal errors. This is often caused by poor data security and sanitization, outdated systems, or a lack of employee training. Data leaks could lead to identity theft, data breaches, or ransomware installation.” (What Is a Data Leak?, n.d.)

Data Leak

Perth Amboy Public Schools:

As a result of a phishing incident, an unauthorized party obtained access to a limited number of employee email accounts. (4/15/2020) (The K12 Cyber Incident Map, n.d.)

Definition

Example

media

11

Categorize

Options (11)

social security number

date of birth

home address

academic records

behavioral records

health records

usually caused by internal errors

a tactic used to manipulate people into providing usernames or passwords

usually involves encryption of data

bad actors hold data hostage until money is paid

an email that comes from a suspicious domain and asks for your credentials

Organize these options into the right categories

Data Leak
Personally Identifiable Information
Phishing
Ransomware

12

13

Local Cyber Incidents

The K12 Cyber Incident Map is “Maintained as a service to the K-12 community, the K-12 Cyber Incident Map is an interactive visualization of
cybersecurity-related incidents reported about U.S. K-12 public schools and districts from 2016 through 2022” (The K12 Cyber Incident Map, n.d.)

This resource can be used to help faculty and staff understand the threat and prepare for cybersecurity incidents.

media

14

Local Cyber Incidents

The K12 Cyber Incident Map shows 1,619 cyber incidents between 2016-2022.

Read the following questions before opening the map:
How many school districts in PA have been the target of cyber-crimes according to this map?

What is the most common type of cyber-crime in PA according to this map?

You will answer these questions on the next 2 slides.

Click the map key on the left side to filter by incident type.
Hover your mouse over the pins to see the school district.
Select the pins to learn more details about the incidents.

media

15

media
media

Time to Review!

16

Multiple Choice

Approximately how many schools in PA have been targeted by cybercrimes since 2016?

1

5

2

18

3

38

4

over 50

17

Multiple Choice

What is the most common type of cyber-crime in PA according to this map?

1

other and ransomware

2

data breaches/leaks

3

denial of service

4

phishing

18

media
media

Goal #2

NOW THAT YOU HAVE SEEN SOME EXAMPLES OF CYBER INCIDENTS, LET’S DIVE INTO THE IMPORTANCE OF PHISHING EMAILS.

19

media

Phishing Emails - Goal #2

Recall the importance of identifying phishing emails.

Access prior knowledge

(Answer this question before continuing)

❑How can learning about phishing emails benefit you?

20

Poll

How can learning about phishing benefit you?

it will help me protect my own personal information

it will help me protect student or staff data that I can access

it can prevent ransomware attacks

it can prevent data leaks

21

22

Video prep

As you watch...

Consider how you could personally be impacted by a ransomware attack.

You will be asked to answer this question after the video.

23

24

Video Response

Question image

How could you be impacted by a ransomware attack?

video
Open Video Recorder

25

media
media

Time to Review!

26

Multiple Choice

T/F - School staff members have varying access to staff and student PII including full names, address, phone numbers, academic, behavioral, and medical records. 


1

True

2

False

27

Multiple Choice

T/F – Phishing emails are rare, therefore, training on this type of cybercrime is unnecessary.

1

True

2

False

28

media
media

Goal #3

NOW THAT YOU HAVE ESTABLISHED THE
IMPORTANCE OF PHISHING EMAILS, LET’S
LOOK AT STRATEGIES TO IDENTIFY THEM.

29

media

Identifying Phishing - Goal #3

Identify the key differences between legitimate and phishing emails

Access prior knowledge

(Answer this question before continuing)

❑Have you ever opened a suspicious email? If so, why did it look suspicious?

30

Open Ended

Have you ever opened a suspicious email? If so, why did it look suspicious?

31

media

Identifying Phishing

• Review the example phishing email shown to the left.

• Here are the items in an email that may contain the red flags of a phishing attempt:

  1. Emotions Triggered

  2. Domain of email address

  3. "From" field

  4. Greeting

  5. Caution Banner

  6. Attachments

  7. Hyperlinks

  8. Spelling/Grammar

32

•The next few slides will show you examples of
the 5 emotions bad actors want to trigger with
their emails:

1. Urgency
2. Fear
3. Greed
4. Curiosity
5. Helpfulness

Carefully review each definition and example.

Which one do you think is the most common?

Review of emotions

33

Poll

Which emotion do you think hackers use the most often in phishing attempts?

fear

curiosity

urgency

greed

helpfulness

34

media
media

Urgency

The email is asking
you to do something
immediately to avoid a negative consequence.

35

media
media

Fear

A threatening email that
is meant to scare you into clicking on links or entering your credentials.

36

media
media

Greed

An email that promises
money or gifts.

37

media
media

Curiosity

An email that tells
you that someone
mentioned you
online or has a funny video attached.

38

media
media

Helpfulness

An email that claims to
be sending you helpful
information or links.

39

Emotions

•Urgency is the most common targeted emotion used in phishing emails.

Now that you know what emotions to look out for, let’s look at an email from top to bottom and review each part to search for red flags.

media
media

40

media

Identifying Emotions

Ask yourself: Does this
email contain language
that is trying to make me
feel a sense of urgency,
fear, greed, curiosity, or
as though the sender
wants to help me?

image: (Irwin, 2022)

41

media

Identifying Emotions

If yes:

•Continue checking for other red flags.
•Go to the company’s website to see if you can verify what the email is claiming.

• If you cannot, report the email as phishing.

image: (Irwin, 2022)

42

Identifying - "From" field

Ask yourself:

If you do not know the person,
refer to step A and check
your emotions.

If the email is targeting any of those emotions, report it as phishing.

image: (Phishing, n.d.)

  • Do I know this person?

  • Was I expecting this email?

  • Does the tone of the email or vocabulary used sound like this person?

media

43

media

Identifying - "From" field

•If you know the person but were
not expecting this email, refer to
step A and check your emotions.

• If you think there is a chance this came from them, reach out to them by phone to verify the email.

• If they did not send it, report it as phishing

• If the email does not sound like it could have come from them, immediately report it as phishing.

image:(Phishing, n.d.)

44

Identifying - Domain

•A legitimate email domain will contain the company’s name without extra letters, symbols, or numbers.

•Domain names work from right to left.

• For example:

JohnDoe@computers.dell.com.
In this example, the domain is dell.

This is not a full proof method of determining legitimate email addresses as they can be replicated.

Legitimate example:
Derek.Brackbill@donegalsd.org

Phishing example:
Derek.Brackbill@donagel123.net

media

45

Identifying - Domain

If you are unsure, google the domain name with the word “legit” after it to see if anyone else online has reported this as a phish.

• If your research reveals that it could be a phish, report it as phishing.

• If your research reveals that it could be legitimate, refer to step A to check your emotions.

• If the email attempts to trigger these emotions, report the email as phishing.

Legitimate example:
Derek.Brackbill@donegalsd.org

Phishing example:
Derek.Brackbill@donagel123.net

46

Email accounts provide users with a profile at the top left of each email. Hovering your mouse over the name or picture and it will open the profile of the sender. You can see this in the GIF on the right.

On the next 2 slides, compare the look and profile of the two emails.

How to use the profile to verify the sender

media

47

media
media

​Email A

​Notice the email and the profile shown on the left.

There are conflicting email addresses shown in the body of the email

Notice that the profile shows the email under "Contact". This email claims to be from someone inside the organization but it's coming from a gmail account.

48

media
media

​Notice the email and the profile shown on the right.

This is a legitimate email from Rachel Bruno.

Notice that the profile shows the correct DSD domain of donegalsd.org and contains more details about your past conversations with this sender.

​Email B

49

Multiple Choice

What is the domain name used by members of Donegal School District?

1

donegal.k-12.edu

2

dsd.org

3

donegalsd.org

4

gmail.com

50

Identifying - Greeting

How does the sender greet you?
Do they call you by name?

• If the email is addressed to a generic name like “user” or
“customer” this might be a red flag.

• Go back to Step A and check your emotions.

• If the email attempts to trigger these emotions, report the email as phishing.

media

51

media

Identifying - Caution Banner

• Look for a yellow or red caution banner. Caution banners are
standard for any emails that
come from outside of the
Donegal School District domain.

• The yellow banner states:“CAUTION: This email originated from outside of the organization. Do not click links or open attachments unless you
recognize the sender and know
the content is safe.”

image: (Palarchio, 2016)

52

media

Identifying - Caution Banner

• The red banner states: “WARNING": The sender of this email could not be validated and may not match the person in the “From” field.”

• If this banner is attached to an email from someone who claims
to be from inside the organization, report it as phishing.

If the banner is red, go back to step B (check the from field) and
C (check the domain).

image: (Palarchio, 2016)

53

Identifying - Attachments

•Look for attachments.

Ask yourself, was I
expecting this attachment?

• If you were not expecting it, refer to step A and check your emotions.

• If the email attempts to trigger these emotions, report the email as phishing.

media

54

Identifying - Attachments

If you were expecting it, can you preview the attachment?

You can preview an attachment by clicking the down arrow and selecting preview.

If you can preview the attachment, you can verify its contents before proceeding.

If the attachment is an unusual file type for example exe, report it as phishing.

If you cannot preview the attachment, report it as phishing.

image: (Crane, 2020)

media
media

55

media

Identifying Hyperlinks

• A hyperlink is an electronic link providing direct access from one distinctively marked place in a hypertext document to another in the same or a different document.
Click the example hyperlink to the left - it will take you to the DSD website.

• Notes:

• Hyperlinks can take you anywhere on the internet.

• They are sometimes highlighted in blue and underlined.

Example:

56

media

Identifying Hyperlinks

• Hover your cursor over the hyperlink to see the web address where the link would take you. Refer to step C to check the domain of the web address.

• If the web address looks like a website you do not want to visit, report it as phishing.

• If you are unsure, refer to step A and check your emotions.

• If the email attempts to trigger these emotions, report the email as phishing.

Example:

57

Identifying Grammar/Spelling

•Look for grammar or spelling mistakes.

•If the email contains spelling or grammar mistakes, refer to step A and check your emotions.

• If the email attempts to trigger these emotions, report the email as
phishing
.

media

58

Anatomy of a Phishing EmailI

Review the 7 signs of a
phishing email to the left.

image: (7 Ways to Recognize a Phishing Email, n.d.)

media

59

media
media

Time to Review!

60

Multiple Choice

Question image

Identify the red flag present in the phishing email example to the left.

1

Urgent message

2

Greeting

3

Spelling/Grammar

61

Multiple Choice

Question image

Identify the red flag present in the phishing email example to the left.

Click the image to make it larger.

1

Spelling/Grammar

2

Email Domain

3

Attachment

62

Multiple Choice

Question image

How should you verify if the email to the left is legitimate?

1

Check my Google Account notifications

2

Click the link in the email

3

Reply to the email to ask a few follow up questions

63

media
media

Goal #4

NOW THAT YOU KNOW HOW TO IDENTIFY A PHISHING EMAIL, YOU WILL LEARN ABOUT THE
IMPORTANCE OF REPORTING.

64

media

Deleting vs. Reporting - Goal # 4

Explain the difference between reporting and deleting phishing emails

Access prior knowledge

(Answer these question before continuing)

❑Have you ever deleted or reported a phishing email before?

If you typically delete them, why not report them?

65

Open Ended

Question image

Have you ever deleted or reported a phishing email before?

If you typically delete them, why not report them?

66

Deleting vs. Reporting

Review the key terms and definitions below:

Key Term

Definition

Example

Report Phishing

Following the procedure to mark an email as phishing which formally notifies the IT department.

Delete Phishing

Following the procedure to select an email and then delete it from your inbox.

media
media

67

Deleting vs. Reporting

When you think you have spotted a phish it is always best
to report it.

Reporting is preferred because it alerts the DSD IT department about a potential security threat.

When the IT department is notified, they can take steps to remove the same phish from other email inboxes.

Microsoft also receives the report, this could prevent people outside of DSD safe from the same bad actor.

Once you report the email as phishing, the email is removed from your inbox.

Deleting a phishing email only removes it from your inbox
and does not alert the IT department, leaving others open
to the same attack.

media

68

69

media
media

Time to Review!

70

Multiple Choice

Question image

Report or Delete: Should the email to the left be reported as phishing or deleted?

1

Deleted

2

Reported

71

Multiple Choice

Question image

Report or Delete: Should the email to the left be reported as phishing or deleted?

1

Delete

2

Report

72

media

Goal #5

NOW THAT YOU KNOW WHY IT’S IMPERATIVE TO REPORT PHISHING EMAILS, LETS REVIEW THE STEPS TO COMPLETE THE TASK.

media

73

media

How to Report - Goal #5

Explain the steps of how to report a phishing scam.

Access prior knowledge

(Answer these questions before continuing)

❑Do you prefer the web or desktop application version of Microsoft Outlook?

Why do you prefer that version?

74

Open Ended

Question image

Do you prefer the web or desktop application version of Microsoft Outlook?

Why do you prefer that version?

See description to the left.

*The web version uses the browser and is what most staff use.

*Some staff prefer the features of the desktop version.

You can access this by searching for the Outlook app in the start menu at the bottom of your screen

75

media
media
media
media
media
media

How to Report

Review the key terms, definitions and examples below:

Key Term

Definition

Example

Ellipsis

Three dots in the upper right corner of your emails.

Report Fishing in
the web version

A button which can be selected from the ellipsis in an outlook email.

Report Button in the
ribbon, in the
desktop client

Looks like an email with a security warning symbol.

Outlook Desktop
Client

Accessed from the applications installed on a laptop or desktop computer.

Outlook Web

Accessed in a browser, typically from the staff portal or Clever page.

76

Reporting a Phish

Determine if you are viewing the suspected phishing email in the desktop client or the web version of Outlook.

The desktop client is an application accessed from the start menu or task bar of your Windows device.

The web version is accessed in the browser from your portal or Clever page.

media
media

77

media
media
media
media
media

Reporting a Phish in the Desktop Client

Outlook Desktop – How to report a phish:

1.

Select the email.

2.

Locate and click the “Report Phishing” button in the ribbon at the top of your email application.

3.

A pop-up box will open to verify that you want to report the email as a phish. Click the blue “Report” button. The email will be removed from your inbox.

78

Reporting a Phish in the web

Outlook Web – How to report a phish:

1.

Select the email.

2.

Locate and select Report.

media

Click Report Phishing.

3.

4.

Click OK. The email will be removed from your inbox.

media

79

media
media

Time to Review!

80

Reorder

Desktop client version: Arrange the steps of reporting a phishing email into the correct order.

Select the email

Locate and click the "Report Phishing" button in the ribbon

Click the blue "Report" button in the pop-up box

The email will be removed from your inbox

1
2
3
4

81

Reorder

Web app version: Arrange the steps of reporting a phishing email into the correct order:

Select the email

Locate and select report

Select "Report Phishing"

Select "OK"

The email will be removed from your inbox.

1
2
3
4
5

Phishing Emails

Donegal School District

media
media

Show answer

Auto Play

Slide 1 / 82

SLIDE