0% found this document useful (0 votes)
16 views1 page

Phishing Program Infographic

The document discusses social engineering, particularly phishing, which is a method used by cybercriminals to manipulate individuals into revealing personal information. It highlights the rise in ransomware attacks and provides statistics on phishing, emphasizing the importance of recognizing phishing tactics such as email phishing, smishing, and vishing. The document also offers tips for avoiding phishing attacks and promotes Cisco Secure Email as a solution for enhancing email security.

Uploaded by

hootanu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views1 page

Phishing Program Infographic

The document discusses social engineering, particularly phishing, which is a method used by cybercriminals to manipulate individuals into revealing personal information. It highlights the rise in ransomware attacks and provides statistics on phishing, emphasizing the importance of recognizing phishing tactics such as email phishing, smishing, and vishing. The document also offers tips for avoiding phishing attacks and promotes Cisco Secure Email as a solution for enhancing email security.

Uploaded by

hootanu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Think Before

You Click

Social engineering is a general term used to


describe how bad actors manipulate individuals
into giving them access to personal information.
Phishing is the most common form of social
engineering for stealing an individual’s personal
information like IDs or passwords, or for installing
malware which can be used for various purposes
including ransomware attacks.

300%
Rise in ransomware attacks in
the US in the past year.1

94%
Of malware on computers found
their way there via phishing email.2

67.5%
Of individuals that click on a phishing
link are likely to enter their credentials
on a phishing website.3

2 Million+
Phishing sites have been found
and registered as malicious by
Google as of January 2021.

Phishing attacks are easier to avoid


when you know how to spot them
It only takes one wrong move for cybercriminals to access your data
or your company’s systems. Protect yourself, your family, and your
organization by learning how to recognize common phishing tactics.

Email Phishing
An email sent with the intention of
deceiving you to act, such as updating a
password or clicking on an attachment.
96% of all phishing attacks come via email.4

Smishing Vishing
Phishing via text. The fraudulent text may Also known as voice phishing occurs via
appear to come from a reputable business, phone. The caller typically leaves an
but is designed to trick you into revealing “urgent” message, making recipients
personal information. believe they will be fined or miss out on a
potential windfall if they don’t respond
immediately.

Angler Phishing
Targets social media users. Bad actors will
direct message disgruntled customers,
pretending to be customer service agents,
to obtain personal information or other
account credentials.

Evil Twin Hotspots Pop-up Phishing


Fraudulent Wi-Fi access points designed Fraudulent messages that “pop up” on
to trick users to connect to them so they otherwise legitimate websites that have
can steal sensitive information or redirect been infected with malicious code and
links to malicious sites. entice you to click on them to corrupt
your device or data.

Don’t take the bait.


Verify before you act
Avoid unknown senders. Never give out personal or
Check names and email financial information based on
addresses before responding. an email request.

Don’t trust links or attachments When receiving email from


in unsolicited emails. known institutions (government,
banks, your doctor), go directly
Be suspicious of emails to the source instead of clicking
marked “urgent.” on links in the email.

Beware of messages with Be wary of generic greetings,


mistakes in spelling or grammar. such as dear sir or ma’am.

Don't be lured by “deals”. They Understand your service provider’s


are usually too good to be true. policy for tracking and stopping
phishing.
Consider finding an email
provider that is more secure Don’t give a stranger or unsolicited
than the free options. help access to your computer.

It’s time to rethink email security


Cisco Secure Email rapidly detects, quarantines, investigates, and remediates
phishing and other cyberattacks that target your email. Plus, our built-in SecureX
platform, included with each email license, provides enhanced visibility, automation,
and a layered approach to security across all of our Cisco Secure products.

Learn more

Click here for more information about the


Anatomy of a Modern Phishing Attack

1 DHS secretary warns ransomware attacks on the rise, ABC News, May 2021
2 Data Breach Investigations Report, Verizon, 2019
3 Phishing Benchmark Global Report, Terranova, 2020
4 Data Breach Investigations Report, Verizon, 2020

© 2021 Cisco and/or its affiliates. All rights reserved.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy