1 / 17

Cyber crime

Cyber crime. Phishing. The internet is a hunting ground. FACEBOOK HIJACKED TO SPREAD CHROME, FIREFOX BROWSER MALWARE. 40% INCREASE IN ANDROID MALWARE CASES IN 2013. PHISHERS CAST A WIDE NET AND CATCH A WHALE. ...and YOU are the target!.

Télécharger la présentation

Cyber crime

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber crime Phishing

  2. The internet is a hunting ground... FACEBOOK HIJACKED TO SPREAD CHROME, FIREFOX BROWSER MALWARE 40% INCREASE IN ANDROID MALWARE CASES IN 2013 PHISHERS CAST A WIDE NET AND CATCH A WHALE

  3. ...and YOU are the target! Cyber crime costs the UK economy £27bn a year British businesses lose £21bn a year Over9 million adults in Britain have had their online accounts hacked Sources: “Survey on Cyber Security” (University of Kent),“The Cost of Cyber Crime" (Detica and Cabinet Office)

  4. Phishing - dangers to you • Information thieves could • Steal your money • Buy goods with your credit card • Steal your identity • Commit crime in your name • Sell your information to other criminals • Attack your friends and colleagues

  5. Phishing - dangers to organisations This could result in • Information thieves can • Steal username and passwords • Steal valuable company and customer information • Vandaliseour networks and systems • Financial damage • Reputationaldamage • Regulatory fines • Loss of business

  6. Phishing • You receive an electronic communication • If you click on the website link, it takes you to a fake version of a well-known website • As soon as you enter your information, it is stolen

  7. Spear phishing

  8. Phishers use Malware to gather information • Spyware: transmits your information by bypassing security Key-logger: records everything that you type Virus: damages computer hardware and software

  9. More phishing threats Website surfing Website advertising Social media Instant messaging Telephone

  10. Embedded animation

  11. Watch for phishing signs • Is your email address correct? • Has the email been sent to people you don’t know? • Does the email start with your name? • Is there an unexpected attachment or website link? • Is there a compelling reason to open the attachment or click on the link? • Does it look unprofessional? • Does it sound like the person?

  12. Think before you click – at work • Make sure you have a secure internet connection • Only use Royal Mail Group systems for work communications • Always check the ‘To’ field before sending emails • Never open/save email attachments or click on website links unless you know they are genuine • Be cautious about ALL incoming emails z

  13. Think before you click – on the net • Restrict your surfing to well known, reputable websites • Check the browser address bar as you visit websites • Look for https:// when logging into online accounts • Avoid clicking on online advertising and pop-ups • Never install software or apps onto your Royal Mail Group computer or mobile device z

  14. 0 Help! I’ve been phished! • Delete phishing emails or report them to the IT Helpdesk • If you believe you’ve visited a phishing website at work, contact the IT Helpdesk • If you divulged a username and password, change your password immediately • If your work computer or mobile device is behaving strangely, contact the IT Helpdesk

  15. To take away 1 It only takes one click for criminals and information thieves to succeed The consequences can be devastating Think before you click Report Phishing emails to the IT helpdesk or to the Information Security team Read the Royal Mail Group Acceptable Use Policy

  16. Thank you!

More Related