Conquer: Recognize how human errors pose security risks to data.
Aspire: Implement strategies to minimize the risk of data being compromised through human error.
Slide 3 - Slide
Social engineering
There are lots of ways to try and keep data safe and secure.
However, Human error arguably creates the largest risk of the data being compromised.
Slide 4 - Slide
Social engineering
Social engineering is a set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes.
Slide 5 - Slide
Phishing
A phishing attack is an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
Slide 6 - Slide
Can you list any errors found in this email, one has been done for you!
Slide 7 - Open question
Phishing: Key indicators of a phishing email
Unexpected email with a request for information
Message content contains spelling errors
Suspicious links in email
Generic emails that don't know you by name or contain any personal information that you would expect the sender to know
Slide 8 - Slide
Phishing attacks
Phishing attacks are not always via email.
Watch the video below and on the next slide, explain what scam you think happened.