1 of 34

Phishing Prevention: How to Protect Your Data and Identity

Storyboard

2 of 34

Overview

Course Title:

Phishing Prevention: How to Protect Your Data and Identity

Learning objective:

Learners will be able to:

-Define phishing

-Identify common signs of phishing

-Recognize various types of phishing attempts

-Prevent phishing attacks

-Protect themselves and company from further damage of phishing attacks

Description Text

This course is a comprehensive and practical guide to help you stay safe and secure online. By taking this training, you'll be better equipped to protect yourself and your company's sensitive information from cybercriminals who use phishing as a way to steal from unsuspecting victims.�

By the end of this course, you will be able to:

  • Define phishing
  • Identify common signs of phishing
  • Recognize various types of phishing attempts
  • Prevent phishing attacks
  • Protect yourself and company from further damage of phishing attacks

Units

Introduction, Anatomy of Phishing Attempts, Phishing Prevention & Protection, Conclusion

Client:

Professionals working with technology

Instructional Designer:

Jenna Quenneville

3 of 34

Units

Nr

Name

Content

1

Introduction

What is Phishing?

2

Anatomy of Phishing Attempts

How to Identify Phishing Attempts

How to Recognize Different Types of Phishing Attempts

3

Phishing Prevention & Protection

How to Prevent Phishing Attacks

How to Protect Against Further Phishing Damage

4

Conclusion

Phishing Quiz

Key Takeaways

4 of 34

Style Guide

Logo

Cover Photo

Phishing account-pana.png

Custom colours

Accent color: #9DA993

Fonts

Heading: Poppins (Bold)

Body: Poppins

Additional Notes

Sidebar navigation: on, search: on, marking lessons complete: off, lesson headers: light

Templates

N/A

5 of 34

1: Introduction

6 of 34

Lesson

What is Phishing?

BLOCK ID

1.1

BLOCK TYPE

Image & Text

NOTES

CONTENT

Image on left

Image:

Attached files-pana.png

Text:

Imagine This

You are at work and suddenly receive an email notification. You click on the notification to view the email below:

7 of 34

Lesson

What is Phishing

BLOCK ID

1.2

BLOCK TYPE

Multimedia (Embed)

NOTES

CONTENT

8 of 34

Lesson

What is Phishing?

BLOCK ID

1.3

BLOCK TYPE

Statement D

NOTES

CONTENT

Have you ever experienced something like this before? If so, you’ve been phished!

9 of 34

Lesson

What is Phishing?

BLOCK ID

1.4

BLOCK TYPE

Image & Text

NOTES

CONTENT

Image on left

Image:

Mobile login-pana.png

Text:

What exactly is phishing?

Phishing is a type of cyber attack in which an attacker attempts to trick an individual or organization into providing sensitive information, such as usernames, passwords, and credit card details. 

10 of 34

Lesson

What is Phishing?

BLOCK ID

1.5

BLOCK TYPE

Statement D

NOTES

CONTENT

Phishing attacks can be very effective because they rely on the victim's trust in the supposed source of the message, and can be difficult to distinguish from legitimate communication.  

11 of 34

Lesson

What is Phishing?

BLOCK ID

1.6

BLOCK TYPE

Continue

NOTES

CONTENT

I’m ready to learn more

12 of 34

Lesson

What is Phishing?

BLOCK ID

1.7

BLOCK TYPE

Image & Text

NOTES

Image on left

CONTENT

Image:

Phishing account-pana.png

Text:

In a phishing attack, scammers "bait" victims to click on a malicious link—or provide personal account or password information.

13 of 34

Lesson

What is Phishing?

BLOCK ID

1.8

BLOCK TYPE

Paragraph with heading

NOTES

CONTENT

What Happens If You Take the Bait?

If you fall for a phishing attack, several things could happen. Select each result below to learn more:

14 of 34

Lesson

What is Phishing?

BLOCK ID

1.9

BLOCK TYPE

Flashcard grid

NOTES

CONTENT

Card 1 Front

Identity Theft

Card 1 Back

The attacker can use the personal information you provide to steal your identity, which can result in financial loss, damage to your credit rating, and even legal issues.

Card 2 Front

Financial Fraud

Card 2 Back

The attacker can use your financial information to make unauthorized purchases or transactions, which can result in financial loss.

Card 3 Front

Malware Infections

Card 3 Back

Some phishing emails or links may contain malware that can infect your computer or device, allowing the attacker to gain access to your files or steal additional information.

Card 4 Front

Account Compromise

Card 4 Back

The attacker can use the information you provide to gain access to your online accounts, which can result in unauthorized access to your personal information, email, or social media accounts

Card 5 Front

Ransomware Attacks

Card 5 Back

In some cases, the attacker may use the information they obtain to launch a ransomware attack, in which they lock down your computer or files and demand a ransom payment in exchange for releasing them.

15 of 34

Lesson

What is Phishing?

BLOCK ID

1.10

BLOCK TYPE

Paragraph with heading

NOTES

CONTENT

What is Malware?

Malware, short for "malicious software," refers to any program or code that is designed to harm, exploit, or steal data from a computer or network. Here are some different malware programs to be aware of:

16 of 34

Lesson

What is Phishing?

BLOCK ID

1.11

BLOCK TYPE

Image Centered

NOTES

CONTENT

17 of 34

Lesson

What is Phishing?

BLOCK ID

1.12

BLOCK TYPE

Statement B

NOTES

CONTENT

In the next lesson, you'll learn about how you can identify a phishing attempt.

18 of 34

Lesson

What is Phishing?

BLOCK ID

1.13

BLOCK TYPE

Continue

NOTES

CONTENT

Continue

19 of 34

2: Anatomy of Phishing Attempts

20 of 34

Lesson

How to Identify Phishing Attempts

BLOCK ID

2.1

BLOCK TYPE

Paragraph with heading

NOTES

CONTENT

Phishing Attempts Can Be Tricky to Spot

Attackers often use sophisticated techniques to make their communications seem legitimate and trustworthy. However, there are some common signs that may indicate that an email or message is a phishing attempt. 

21 of 34

Lesson

How to Identify Phishing Attempts

BLOCK ID

2.2

BLOCK TYPE

Image Centered

NOTES

CONTENT

Zoom on click off

Image:

Personal data-pana.png

22 of 34

Lesson

How to Identify Phishing Attempts

BLOCK ID

2.3

BLOCK TYPE

Paragraph

NOTES

CONTENT

Scammers may dig up personal information about you on social media, company websites, or other public profiles to make their communications more personalized—and more challenging to detect.

23 of 34

Lesson

How to Identify Phishing Attempts

BLOCK ID

2.4

BLOCK TYPE

Paragraph with heading

NOTES

CONTENT

Be on the look out for red flags!

Check out the sample phishing attack below. Select each marker to learn more about the most common signs of phishing.

24 of 34

Lesson

How to Identify Phishing Attempts

BLOCK ID

2.5

BLOCK TYPE

Labelled Graphic

NOTES

CONTENT

Marker style (+)

Markers:

Grammar, Spelling, or Punctuation Errors: Phishing emails often contain typos and grammatical errors.

Request for Personal or Sensitive Information: Phishing emails often ask for personal or sensitive information, such as passwords or credit card numbers.

Urgent or Threatening Language: Phishing emails use urgent or threatening language as a way to create a sense of urgency or fear in the recipient, which can lead them to act without thinking. The idea is to make the recipient feel that there is a pressing need to respond quickly and that failing to do so will have negative consequences. 

Hyperlinks or Attachments: Phishing emails often contain attachments or links that lead to malicious websites or downloads. Hover your mouse over the link to see the URL. Check to make sure the URL matches the text of the link and that it is spelled correctly. 

Be on the look out for:

-Links that don't match the destination

-Links with misspellings

-Unexpected attachments

-Attachments ending in .exe

Unfamiliar or Illegitimate Senders: Phishing emails often come from addresses that appear to be from a trusted source, but are slightly altered. Verify the sender's address and check if it is legitimate.

Tip! Always check the sender's email address. Does it match the standard address for the company that the email claims to represent?

A Generic Subject Line of Salutation: Phishing emails often use generic greetings such as "Dear Customer" or "Dear Client" instead of using your name.

25 of 34

Lesson

How to Identify Phishing Attempts

BLOCK ID

2.6

BLOCK TYPE

Paragraph with heading

NOTES

CONTENT

Additional Questions to Ask Yourself

Select each card to learn about the questions you should be asking yourself when you receive an email or message to determine if it is phishing or not.

26 of 34

Lesson

How to Identify Phishing Attempts

BLOCK ID

2.7

BLOCK TYPE

Flashcard Stack

NOTES

CONTENT

Card 1 Front

Is the email unsolicited?

Card 1 Back

If the email is unwanted or unexpected, there is a much higher chance that it is a phishing attempt.

Card 2 Front

Does it ask for your personal or account information?

Card 2 Back

Phishing emails typically request personal information to gain access to sensitive information.

Card 3 Front

Does it use fear tactics?

Card 3 Back

Many phishing emails use threatening or urgent language to instill fear in the recipient, which can lead them to act without thinking and worry about negative consequences if they don't act quickly.

Card 4 Front

Does it offer you something for free?

Card 4 Back

Some phishing attacks offer something for free as a way to lure victims into providing their personal information or downloading malware. By offering something for free, scammers can create a sense of urgency and desire in the victim, which can make them more likely to fall for the scam. If something seems suspicious or too good to be true, it probably is. 

Card 5 Front

Does the email feel strange or does it not make sense?

Card 5 Back

Phishing emails often contain typos and grammatical errors. 

27 of 34

Lesson

How to Identify Phishing Attempts

BLOCK ID

2.8

BLOCK TYPE

Image & Text

NOTES

Image on left

Image size: 75%

CONTENT

Image:

Image caption: Common Signs of Phishing Infographic

Text:

You can use this infographic to help you identify phishing emails.

Below you will find a PDF of this infographic. Select the file if you would like to download it for future use.

28 of 34

Lesson

How to Identify Phishing Attempts

BLOCK ID

2.9

BLOCK TYPE

Attachment

NOTES

CONTENT

Common Signs of Phishing Infographic Green.pdf

29 of 34

Lesson

How to Identify Phishing Attempts

BLOCK ID

2.10

BLOCK TYPE

Paragraph with heading

NOTES

CONTENT

Check your understanding!

Use what you've learned about the common signs of phishing to determine if these emails are legitimate or phishing.

30 of 34

Lesson

How to Identify Phishing Attempts

BLOCK ID

2.11

BLOCK TYPE

Knowledge Check: Multiple Choice

NOTES

Correct answer: Phishing

Correct/Incorrect Feedback

CONTENT

Question:

Is this email legitimate or a phishing attempt?

Image:

Answer Choices:

Legitimate

Phishing

Correct Feedback: Yes! Phishing emails usually have a generic greeting, urgent or threatening language, request personal information, and contain a malicious link or attachment.

Incorrect Feedback: Remember, legitimate people and companies will typically use your name as the email greeting and will not ask you for sensitive information through email. Phishing emails normally start with a generic greeting like "Dear Customer" and may have a malicious attachment or link.

31 of 34

Lesson

How to Identify Phishing Attempts

BLOCK ID

2.12

BLOCK TYPE

Knowledge Check: Multiple Choice

NOTES

Correct answer: Spelling errors, generic greeting, and dangerous attachment

Correct/Incorrect Feedback

CONTENT

Question:

What phishing signs do you notice in this email?

Image:

Answer Choices:

Mismatched information and small font

Spelling errors, generic greeting, and dangerous attachment

Unknown sender and malicious link

Correct Feedback: Great job identifying the common signs of phishing in this email!

Incorrect Feedback: The greeting does not use the recipient's name, there is an attachment requesting sensitive information, and a word is misspelled.

32 of 34

Lesson

How to Identify Phishing Attempts

BLOCK ID

2.13

BLOCK TYPE

Knowledge Check: Multiple Choice

NOTES

Correct answer: Legitimate

Correct/Incorrect Feedback

CONTENT

Question:

Is this email legitimate or a phishing attempt?

Image:

Answer Choices:

Phishing

Legitimate

Correct Feedback: Yes! This is a legitimate email from Dropbox. There are no spelling or punctuation errors and the sender is “dropboxmail.com”, which is unusual but legitimate.

Incorrect Feedback: This is a legitimate Dropbox communication. The sender is “dropboxmail.com”, which is unusual but legitimate, and the URL is a secure link (https) to “dropbox.com”. If you are unsure about a domain, you can use a search engine to find out more information.

33 of 34

Lesson

How to Identify Phishing Attempts

BLOCK ID

2.14

BLOCK TYPE

Statement B

NOTES

CONTENT

Next, you'll learn about the different types of phishing attempts and how to recognize them.

34 of 34

Lesson

How to Identify Phishing Attempts

BLOCK ID

2.15

BLOCK TYPE

Continue

NOTES

CONTENT

Continue