A presentation about the best practices to prevent harmful outcomes of phishing, smishing, and other forms of hacking.
Dale Klein's presentation at Gigs, Geeks & God regarding best practices to prevent harmful outcomes of phishing, smishing, and other forms of hacking.
Topics covered:
Download the PowerPoint slide deck.
Have I Been Pwned? Troy Hunt - a Microsoft Regional Director Most Valuable Professional awardee for Developer Security Blogger at troyhunt.com, international speaker on web security
Check if you have an account that has been compromised in a data breach
Check if your Passwords have been exposed “Pwned Passwords are 555,278,657 real world passwords previously exposed in data breaches. This exposure makes them unsuitable for ongoing use as they're at much greater risk of being used to take over other accounts. They're searchable online, as well as being downloadable, for use in other online systems.”
Knowbe4.com/what-is-social-engineering/#6 (tip sheets are three quarters down on the page)
10 tips for spotting a phishing email
How to Spot a Phishing Email or Fake Landing Page
How to Identify a Phishing or Spoofing Email
The best password managers of 2019
Spotting Phishing Emails (video)
Identifying Phishing Emails (video)
Phishing Attack Example - How to Spot a Scam Email (video)
3501 South Lake Drive St. Francis, WI 53235