Campanha de Conscientização Sobre Phishing
Campanha de Conscientização Sobre Phishing
PHISHING
AWARENESS
TRAINING
Think Before You Click!
1 2 3
Define phishing and Recognize red flags in Develop critical
identify common phishing emails, thinking skills to
methods used by messages, or posts discern legitimate
scammers requests from
potential phishing
attempts
WHAT IS
PHISHING?
Phishing is when someone tries to trick
you into revealing personal information
like your password, credit card numbers,
or social security number.
Think of an email or message you received
Phishing can happen through emails, text that asked for personal information. What
made it suspicious?
messages, or other online platforms.
TYPES OF PHISHING
Phishing attacks come in different forms
6 Generic greetings
02 SUSPICIOUS SENDER
INFORMATION 04 MISSPELLINGS OR
GRAMMATICAL ERRORS
Check the sender's email address or social Phishing emails or messages may contain
media profile. Phishing emails or messages misspellings, grammatical errors, or
often use generic or suspicious email awkward phrasing. Legitimate organizations
addresses that do not match the legitimate usually have professional communications
entity they claim to represent. and do not contain obvious errors.
05 SUSPICIOUS LINKS OR
ATTACHMENTS 07 TOO GOOD TO BE TRUE
Be cautious of links or attachments in emails Phishing attempts may lure individuals with
or messages from unknown or untrusted enticing offers, such as winning a prize or
sources. Hover over links to check their getting a huge discount. If an offer seems
actual destinations, and do not click on too good to be true, it may be a phishing
suspicious links or download attachments attempt.
that you were not expecting.
06 GENERIC GREETINGS
Which of the seven red flags do you think is
the hardest to detect? What makes you say
Phishing emails may use generic greetings that?
like "Dear Customer" instead of addressing
you by your name. Legitimate organizations
often personalize their communications with
your name or other relevant information.
EXAMPLES OF REAL LIFE
INCIDENTS
EXAMPLE 1 EXAMPLE 2
Credential Theft - Yahoo (2014): Ransomware Attack - WannaCry (2017):
Incident: Incident:
Yahoo suffered a massive data breach when While not a traditional phishing attack, the
attackers used a combination of spear- WannaCry ransomware spread via phishing
phishing and credential theft to gain emails. It exploited a Windows vulnerability
unauthorized access to user accounts. to encrypt files and demanded a ransom for
their release.
Consequences:
The breach exposed the personal Consequences:
information of 500 million users. This event The attack impacted over 200,000 computers
severely damaged Yahoo's reputation, in 150 countries, affecting critical
resulting in legal consequences and a infrastructure, healthcare systems, and
decrease in user trust. businesses. The financial and operational
consequences were significant.
PROTECTING YOURSELF
AGAINST PHISHING
BEST PRACTICES
Keep software and systems up to date
PROTECT YOURSELF
FROM PHISHING
Don't share your personal information online!
RESOURCES
Cybersecurity & Infrastructure Security Agency (CISA):
Offers a framework for improving cybersecurity posture, with guidelines and best practices.
StaySafeOnline:
A resource by the National Cyber Security Alliance, providing tips, resources, and educational materials.