�Phishing Prevention: How to Protect Your Data and Identity
Storyboard
Overview | |
Course Title: | Phishing Prevention: How to Protect Your Data and Identity |
Learning objective: | Learners will be able to: -Define phishing -Identify common signs of phishing -Recognize various types of phishing attempts -Prevent phishing attacks -Protect themselves and company from further damage of phishing attacks |
Description Text | This course is a comprehensive and practical guide to help you stay safe and secure online. By taking this training, you'll be better equipped to protect yourself and your company's sensitive information from cybercriminals who use phishing as a way to steal from unsuspecting victims.� By the end of this course, you will be able to:
|
Units | Introduction, Anatomy of Phishing Attempts, Phishing Prevention & Protection, Conclusion |
Client: | Professionals working with technology |
Instructional Designer: | Jenna Quenneville |
Units | ||
Nr | Name | Content |
1 | Introduction | What is Phishing? |
2 | Anatomy of Phishing Attempts | How to Identify Phishing Attempts How to Recognize Different Types of Phishing Attempts |
3 | Phishing Prevention & Protection | How to Prevent Phishing Attacks How to Protect Against Further Phishing Damage |
4 | Conclusion | Phishing Quiz Key Takeaways |
Style Guide | |
Logo | |
Cover Photo | Phishing account-pana.png |
Custom colours | Accent color: #9DA993 |
Fonts | Heading: Poppins (Bold) Body: Poppins |
Additional Notes | Sidebar navigation: on, search: on, marking lessons complete: off, lesson headers: light |
Templates | N/A |
1: Introduction
Lesson | What is Phishing? | ||
BLOCK ID | 1.1 | BLOCK TYPE | Image & Text |
NOTES | CONTENT | ||
Image on left | Image: Attached files-pana.png Text: Imagine This You are at work and suddenly receive an email notification. You click on the notification to view the email below: | ||
Lesson | What is Phishing | ||
BLOCK ID | 1.2 | BLOCK TYPE | Multimedia (Embed) |
NOTES | CONTENT | ||
| |||
Lesson | What is Phishing? | ||
BLOCK ID | 1.3 | BLOCK TYPE | Statement D |
NOTES | CONTENT | ||
| Have you ever experienced something like this before? If so, you’ve been phished! | ||
Lesson | What is Phishing? | ||
BLOCK ID | 1.4 | BLOCK TYPE | Image & Text |
NOTES | CONTENT | ||
Image on left | Image: Mobile login-pana.png Text: What exactly is phishing? Phishing is a type of cyber attack in which an attacker attempts to trick an individual or organization into providing sensitive information, such as usernames, passwords, and credit card details. | ||
Lesson | What is Phishing? | ||
BLOCK ID | 1.5 | BLOCK TYPE | Statement D |
NOTES | CONTENT | ||
| Phishing attacks can be very effective because they rely on the victim's trust in the supposed source of the message, and can be difficult to distinguish from legitimate communication. | ||
Lesson | What is Phishing? | ||
BLOCK ID | 1.6 | BLOCK TYPE | Continue |
NOTES | CONTENT | ||
| I’m ready to learn more | ||
Lesson | What is Phishing? | ||
BLOCK ID | 1.7 | BLOCK TYPE | Image & Text |
NOTES Image on left | CONTENT Image: | ||
| Phishing account-pana.png Text: In a phishing attack, scammers "bait" victims to click on a malicious link—or provide personal account or password information. | ||
Lesson | What is Phishing? | ||
BLOCK ID | 1.8 | BLOCK TYPE | Paragraph with heading |
NOTES | CONTENT | ||
| What Happens If You Take the Bait? If you fall for a phishing attack, several things could happen. Select each result below to learn more: | ||
Lesson | What is Phishing? | ||
BLOCK ID | 1.9 | BLOCK TYPE | Flashcard grid |
NOTES | CONTENT | ||
| Card 1 Front Identity Theft Card 1 Back The attacker can use the personal information you provide to steal your identity, which can result in financial loss, damage to your credit rating, and even legal issues. Card 2 Front Financial Fraud Card 2 Back The attacker can use your financial information to make unauthorized purchases or transactions, which can result in financial loss. Card 3 Front Malware Infections Card 3 Back Some phishing emails or links may contain malware that can infect your computer or device, allowing the attacker to gain access to your files or steal additional information. Card 4 Front Account Compromise Card 4 Back The attacker can use the information you provide to gain access to your online accounts, which can result in unauthorized access to your personal information, email, or social media accounts Card 5 Front Ransomware Attacks Card 5 Back In some cases, the attacker may use the information they obtain to launch a ransomware attack, in which they lock down your computer or files and demand a ransom payment in exchange for releasing them. | ||
Lesson | What is Phishing? | ||
BLOCK ID | 1.10 | BLOCK TYPE | Paragraph with heading |
NOTES | CONTENT | ||
| What is Malware? Malware, short for "malicious software," refers to any program or code that is designed to harm, exploit, or steal data from a computer or network. Here are some different malware programs to be aware of: | ||
Lesson | What is Phishing? | ||
BLOCK ID | 1.11 | BLOCK TYPE | Image Centered |
NOTES | CONTENT | ||
| | ||
Lesson | What is Phishing? | ||
BLOCK ID | 1.12 | BLOCK TYPE | Statement B |
NOTES | CONTENT | ||
| In the next lesson, you'll learn about how you can identify a phishing attempt. | ||
Lesson | What is Phishing? | ||
BLOCK ID | 1.13 | BLOCK TYPE | Continue |
NOTES | CONTENT | ||
| Continue | ||
2: Anatomy of Phishing Attempts
Lesson | How to Identify Phishing Attempts | ||
BLOCK ID | 2.1 | BLOCK TYPE | Paragraph with heading |
NOTES | CONTENT | ||
| Phishing Attempts Can Be Tricky to Spot Attackers often use sophisticated techniques to make their communications seem legitimate and trustworthy. However, there are some common signs that may indicate that an email or message is a phishing attempt. | ||
Lesson | How to Identify Phishing Attempts | ||
BLOCK ID | 2.2 | BLOCK TYPE | Image Centered |
NOTES | CONTENT | ||
Zoom on click off | Image: Personal data-pana.png | ||
Lesson | How to Identify Phishing Attempts | ||
BLOCK ID | 2.3 | BLOCK TYPE | Paragraph |
NOTES | CONTENT | ||
| Scammers may dig up personal information about you on social media, company websites, or other public profiles to make their communications more personalized—and more challenging to detect. | ||
Lesson | How to Identify Phishing Attempts | ||
BLOCK ID | 2.4 | BLOCK TYPE | Paragraph with heading |
NOTES | CONTENT Be on the look out for red flags! | ||
| Check out the sample phishing attack below. Select each marker to learn more about the most common signs of phishing. | ||
Lesson | How to Identify Phishing Attempts | ||
BLOCK ID | 2.5 | BLOCK TYPE | Labelled Graphic |
NOTES | CONTENT | ||
Marker style (+) | Markers: Grammar, Spelling, or Punctuation Errors: Phishing emails often contain typos and grammatical errors. Request for Personal or Sensitive Information: Phishing emails often ask for personal or sensitive information, such as passwords or credit card numbers. Urgent or Threatening Language: Phishing emails use urgent or threatening language as a way to create a sense of urgency or fear in the recipient, which can lead them to act without thinking. The idea is to make the recipient feel that there is a pressing need to respond quickly and that failing to do so will have negative consequences. Hyperlinks or Attachments: Phishing emails often contain attachments or links that lead to malicious websites or downloads. Hover your mouse over the link to see the URL. Check to make sure the URL matches the text of the link and that it is spelled correctly. Be on the look out for: -Links that don't match the destination -Links with misspellings -Unexpected attachments -Attachments ending in .exe Unfamiliar or Illegitimate Senders: Phishing emails often come from addresses that appear to be from a trusted source, but are slightly altered. Verify the sender's address and check if it is legitimate. Tip! Always check the sender's email address. Does it match the standard address for the company that the email claims to represent? A Generic Subject Line of Salutation: Phishing emails often use generic greetings such as "Dear Customer" or "Dear Client" instead of using your name. | ||
Lesson | How to Identify Phishing Attempts | ||
BLOCK ID | 2.6 | BLOCK TYPE | Paragraph with heading |
NOTES | CONTENT | ||
| Additional Questions to Ask Yourself Select each card to learn about the questions you should be asking yourself when you receive an email or message to determine if it is phishing or not. | ||
Lesson | How to Identify Phishing Attempts | ||
BLOCK ID | 2.7 | BLOCK TYPE | Flashcard Stack |
NOTES | CONTENT Card 1 Front Is the email unsolicited? Card 1 Back If the email is unwanted or unexpected, there is a much higher chance that it is a phishing attempt. Card 2 Front Does it ask for your personal or account information? Card 2 Back Phishing emails typically request personal information to gain access to sensitive information. Card 3 Front Does it use fear tactics? Card 3 Back Many phishing emails use threatening or urgent language to instill fear in the recipient, which can lead them to act without thinking and worry about negative consequences if they don't act quickly. Card 4 Front Does it offer you something for free? Card 4 Back Some phishing attacks offer something for free as a way to lure victims into providing their personal information or downloading malware. By offering something for free, scammers can create a sense of urgency and desire in the victim, which can make them more likely to fall for the scam. If something seems suspicious or too good to be true, it probably is. Card 5 Front Does the email feel strange or does it not make sense? Card 5 Back Phishing emails often contain typos and grammatical errors. | ||
| | ||
Lesson | How to Identify Phishing Attempts | ||
BLOCK ID | 2.8 | BLOCK TYPE | Image & Text |
NOTES Image on left Image size: 75% | CONTENT Image: Image caption: Common Signs of Phishing Infographic Text: You can use this infographic to help you identify phishing emails. Below you will find a PDF of this infographic. Select the file if you would like to download it for future use. | ||
| | ||
Lesson | How to Identify Phishing Attempts | ||
BLOCK ID | 2.9 | BLOCK TYPE | Attachment |
NOTES | CONTENT Common Signs of Phishing Infographic Green.pdf | ||
| | ||
Lesson | How to Identify Phishing Attempts | ||
BLOCK ID | 2.10 | BLOCK TYPE | Paragraph with heading |
NOTES | CONTENT Check your understanding! Use what you've learned about the common signs of phishing to determine if these emails are legitimate or phishing. | ||
| | ||
Lesson | How to Identify Phishing Attempts | ||
BLOCK ID | 2.11 | BLOCK TYPE | Knowledge Check: Multiple Choice |
NOTES Correct answer: Phishing Correct/Incorrect Feedback | CONTENT Question: Is this email legitimate or a phishing attempt? Image: Answer Choices: Legitimate Phishing Correct Feedback: Yes! Phishing emails usually have a generic greeting, urgent or threatening language, request personal information, and contain a malicious link or attachment. Incorrect Feedback: Remember, legitimate people and companies will typically use your name as the email greeting and will not ask you for sensitive information through email. Phishing emails normally start with a generic greeting like "Dear Customer" and may have a malicious attachment or link. | ||
| | ||
Lesson | How to Identify Phishing Attempts | ||
BLOCK ID | 2.12 | BLOCK TYPE | Knowledge Check: Multiple Choice |
NOTES Correct answer: Spelling errors, generic greeting, and dangerous attachment Correct/Incorrect Feedback | CONTENT Question: What phishing signs do you notice in this email? Image: Answer Choices: Mismatched information and small font Spelling errors, generic greeting, and dangerous attachment Unknown sender and malicious link Correct Feedback: Great job identifying the common signs of phishing in this email! Incorrect Feedback: The greeting does not use the recipient's name, there is an attachment requesting sensitive information, and a word is misspelled. | ||
| | ||
Lesson | How to Identify Phishing Attempts | ||
BLOCK ID | 2.13 | BLOCK TYPE | Knowledge Check: Multiple Choice |
NOTES Correct answer: Legitimate Correct/Incorrect Feedback | CONTENT Question: Is this email legitimate or a phishing attempt? Image: Answer Choices: Phishing Legitimate Correct Feedback: Yes! This is a legitimate email from Dropbox. There are no spelling or punctuation errors and the sender is “dropboxmail.com”, which is unusual but legitimate. Incorrect Feedback: This is a legitimate Dropbox communication. The sender is “dropboxmail.com”, which is unusual but legitimate, and the URL is a secure link (https) to “dropbox.com”. If you are unsure about a domain, you can use a search engine to find out more information. | ||
| | ||
Lesson | How to Identify Phishing Attempts | ||
BLOCK ID | 2.14 | BLOCK TYPE | Statement B |
NOTES | CONTENT Next, you'll learn about the different types of phishing attempts and how to recognize them. | ||
| | ||
Lesson | How to Identify Phishing Attempts | ||
BLOCK ID | 2.15 | BLOCK TYPE | Continue |
NOTES | CONTENT Continue | ||
| | ||