hacker-(1).png

Definition

The fraudulent attempt to obtain personal info or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy company or person in an electronic communication.

phishingwhite.png

What is Phishing?

Protecting your

Data 

Did you receive a suspicious email?

In today’s day and age, there are many different avenues that a person can take to steal your identity, such as using phishing and spoofing emails. Falling prey to phishing and spoofing tactics can not only effect you, but an entire organization. We wanted to give a short breakdown on what these two attacks are and how you can be proactive with your approach to protecting your data.

spoofing.png

What is Spoofing?

fake-website.png

Definition

Creation and sending of an email from a forged email address

Follow the Communication Pipeline!

Every site, service, or organization will have defined ways that they communicate with you. 

If you receive communication that is not within the guidelines of that service, DO NOT click the link or download file.

check-mark-(1).png

Dos

  • Report the email to one of the following

    • Your Company​

    • Your Email Provider

    • The authorities

    • The sender organization

  • Mark as spam

  • After it is reported, delete the email

close.png

Don'ts

  • Click on any links

  • Download any attachments

  • Give personal information

  • Log into any suspicious websites

  • Be passive

my-memoji-with-mac1000.png

Protect

Your Identity!

Change Your Password Regularly

Be  Proactive!

Good Password

Practices

  • Use special characters

  • Use a mixture of uppercase and lowercase letters

  • Throw numbers into the mix

  • Use a minimum of 8 characters

  • Always set up 2 factor authentication

  • Change password once a quarter

  • Set a lockout for a minimum of 10 attempts

 

©2019 by www.rootedconsulting.org. Proudly created with Wix.com