0% found this document useful (0 votes)
76 views9 pages

Email Phishing Awareness

The document discusses how phishing attacks have increased significantly against the manufacturing industry, moving it to the second most targeted industry in 2021. It provides examples of common phishing techniques like fake supplier emails and executive impersonation. It also outlines top cybersecurity threats to the manufacturing industry including ransomware, supply chain attacks, IoT security risks, and intellectual property theft.

Uploaded by

balssanoor27
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views9 pages

Email Phishing Awareness

The document discusses how phishing attacks have increased significantly against the manufacturing industry, moving it to the second most targeted industry in 2021. It provides examples of common phishing techniques like fake supplier emails and executive impersonation. It also outlines top cybersecurity threats to the manufacturing industry including ransomware, supply chain attacks, IoT security risks, and intellectual property theft.

Uploaded by

balssanoor27
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

ARE YOU AWARE

OF THE INTENSITY
OF PHISHING
ATTACKS?
STATISTICS

The manufacturing industry moved from the 8th most targeted industry by cyber attackers in
2019 to become the 2nd most targeted industry in 2021, falling behind only finance and
insurance. According to the 2021 Global Threat Intelligence Report (GTIR), this represents a 300%
increase in a single year.
PHISHING ATTACK
Cyber attack where attackers impersonate trusted entities, such as colleagues,
suppliers, or financial institutions, to trick individuals into revealing sensitive
information or performing harmful actions.

1 2 3
DO’S DON’Ts
SCENARIOS Don’t click on suspicious links
• Verify the sender's identity ●
• Fake Supplier Email • Scrutinise email content or download attachments
• Executive Impersonation • Keep software and systems up ● Don’t disclose sensitive
• Delivery Notification Scams to date information
• Report suspicious emails ● Don’t have same password
• Be alert on all communication across multiple accounts
platforms including social ● Don't ignore security updates
media
--EXAMPLES--
IDENTIFY PHISHING EMAILS

The message is sent from a public email domain The domain name is misspelt
--EXAMPLES--
IDENTIFY PHISHING EMAILS

. The domain name is misspelt Suspicious attachments or links


Phisher claims to be sending an invoice
Phishing is the building block; once you are trapped,
other attacks follow…

HERE ARE THE OTHER TOP 4 CYBER


THREATS AFFECTING THE
MANUFACTURING INDUSTRY!
RANSOMWARE SUPPLY CHAIN
ATTACKS
Once injected into the
computer, attacker encrypts It takes one employee at a
data making it unavailable. supply chain partner to
-
Ransom must be paid to make respond to a phishing email
it available and provide sensitive data.
IoT SECURITY INTELLECTUAL
RISKS PROPERTY THEFT

Unauthorized access Theft of valuable


to sensors and other information, and innovative
IoT devices leading to techniques of production
data breaches resulting in loss of
competitive advantage.
REMEMBER
TO
MARS JUPITER REPORT
VENUS
THE HOOK!

Presentation created by Noorunnisa

You might also like