Phishing 101: The Guide to Not Getting Hooked

Online Phishing Illustration

Credit: CREST Research
Title: ECR Series: What Makes People Susceptible To Malevolent Influence Online?
Link: https://www.flickr.com/photos/crestresearch/35156092515/
Some rights reserved

When deciding on the topic of my final project I found myself choosing between two ideas: creating a guide to using keyboard shortcuts and a tutorial on identifying phishing emails. After giving it some thought and talking it through with a few people, I decided that though becoming more efficient at using a keyboard is useful and applicable on a daily basis, being able to identify a phishing email is more important since the implications of not being able to identify a fake email are much greater. The latter would also, if done correctly, make for a more interesting video. At its base, my target audience is broad: anyone who uses email. I will likely get a little more specific when informing viewers what to do with a phishing email, limiting it to Gmail and perhaps one or two other services. I also plan on using Adelphi and its brand as an example, seemingly targeting Adelphi constituents, but viewers will be able to extrapolate the information provided to their respective organizations.

Reference List:

Bisson, D. (2016, June 6). 6 Common Phishing Attacks and How to Protect Against Them. Retrieved from https://www.tripwire.com/state-of-security/security-awareness/6-common-phishing-attacks-and-how-to-protect-against-them/


Grimes, R. A. (2017, November 02). 15 real-world phishing examples – and how to recognize them. Retrieved from https://www.csoonline.com/article/3235520/15-real-world-phishing-examples-and-how-to-recognize-them.html


KnowBe4, Inc. (n.d.). General Phishing Information and Prevention Tips. Retrieved April 27, 2019, from https://www.phishing.org/


Phishing. (n.d.). Retrieved April 27, 2019, from https://it.adelphi.edu/security/phishing/


Phishing. (n.d.). Retrieved April 27, 2019, from https://security.berkeley.edu/resources/phishing

One thought on “Phishing 101: The Guide to Not Getting Hooked

  1. HI Tanja, I continue to be surprised at how frequently colleagues at Universities “bite” when hishing occurs. There is clearly a need for more resources like the one you are producing.

    Like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s