OOPS! You clicked on a simulated phishing test.

Please take a minute to read this article
 
  •  

37.9%

Users who don’t undergo cyber awareness training fail phishing tests.

  •  

94%

Nearly all malware is delivered by email.

  •  

64%

Of organisations have experienced a phishing attack in the past year

Here are some tips to help you stay safer in the future

 

Tip: #1

Slowdown, Read, Ask yourself

Did anything look out of the ordinary?
Did you recognize the senders address?
Was it similar but not the same as an official email?

incident@dropboxsupport.com.au

Tip: #2

Be Vigilant

Hover your mouse over links and images to view the destination, does the location match the source of the email?

Tip: #3

When in doubt
throw it out

If you ever think that an email is suspicious it is better to err on the side of caution.
Forward it to support@navada.com.au

What is phishing

Phishing emails and text messages may look like they’re from a company you know or trust.
They may look like they’re from a bank, a credit card company, a social networking site, an online payment website or app, or an online store.

Phishing emails and text messages often tell a story to trick you into clicking on a link or opening an attachment. They may
 
  • say they’ve noticed some suspicious activity or log-in attempts
  • claim there’s a problem with your account or your payment information
  • say you must confirm some personal information
  • include a fake invoice
  • want you to click on a link to make a payment
  • say you’re eligible to register for a government refund
  • offer a coupon for free stuff

Here is an example of a Phishing email:


 

Phishing Terminology

  • Phishing

  • This is an attempt to gain access to information, the likes of usernames,
    passwords and credit card details, by pretending to be someone you’re not,
    and hiding as a trusting entity through email.
  • Spear Phishing

  • Spear phishing is similar only as it is specifically directed at individuals or specific companies. Like hunters, they sought out their prey and they attack with accuracy. This technique of phishing is by far the most successful scam on the Internet today, as it makes up 91% of online attacks.
  • Clone Phishing

  • This is a phishing attack where, a formerly legitimate email containing links, has been taken and used to create an identical fraudulent email. Replacing the original link with a new malicious link, this is then sent from a fake email address, in an attempt to appear to come from the original email address.
  • Whaling

  • Whaling are the kind of attacks that are aimed at higher end personnel within companies, the likes of senior executives CEOs and CIOs. In this instance, the masquerading email usually takes the form of a customer complaint or an employee issue, in order to gain their attention. People in this position usually tend to have more valuable information and more financial power.

Consequences of Phishing

In short, exposing your usernames and passwords to an unknown entity can lead to identity theft.
The cost of phishing to personal and or businesses is hard to estimate,
For personal; An immediate and complete change of all passwords and alerting the bank to change credit cards usually will close the vulnerability.
For business; The breach, which is usually discovered after an incident is reported and the information taken has already been used.
This can result in invoices being paid into the offenders accounts with no recourse or stock being ordered and delivered to an incorrect location.

The click that brought you to this page, could have been a click that lead you to expose either your details or your companies details

If you feel you or your company needs more education on phishing
Please reach out to us : support@navada.com.au