In today’s tech environment, users are more prone than ever to a wide range of cyber threats. Even the odds and get the tools you need to Identify, Handle, and Prevent these modern-day cyber concerns. This section will help prepare you with real-life examples and the measures you can take now to counter the most common methods employed in cyber thievery. Put the power back in your hands!
Account and Device Safety
Frequently Asked Questions
We put together an example of what a Phishing Email might look like.
Can you find at least 8 red-flags with the example below?
From: The Help Desk <email@example.com>
Subject: Please update your account information
Date: Sep 12, 2018:23 PM PST
As a courtsy to our valued customers, The Support center conducts
regular acount information verification processes. During the most
close process, we found that we could not verify your information.
In order to ensure your account information is not made vulnerable,
please visit Your Account.
Please click on the above link to our Web site and confirm or update
your account information. If you don't do this within 48 hors of
receipt of this e-mail, you will not be able t o use your account as it
is will be deleted! This is an special precaution we take to ensure your
account remains secure.
The Support Center att PsD Shools
What'd You Find?