Story 4

You might also like

Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 1

Objective: Learn to identify phishing attempts and protect yourself from falling

victim to these scams.


Step-by-Step Guide:

What is Phishing?:
Define phishing and explain how it works.
Provide examples of common phishing attacks (email, SMS, social media).

Recognizing Phishing Emails:


Look for red flags: suspicious sender addresses, generic greetings, urgent
language.
Check for spelling and grammar mistakes.
Hover over links to see the actual URL before clicking.

Protecting Against Phishing:


Never share personal information via email or click on suspicious links.
Use email filters and anti-phishing tools (e.g., browser extensions).

Reporting Phishing Attempts:


Show how to report phishing emails to your email provider and relevant
authorities.
Discuss the importance of reporting to help prevent others from being
targeted.

Phishing Simulations:
Suggest using phishing simulation tools for organizations to train
employees.
Provide resources or services that offer phishing simulations.

You might also like