avprotect.net - CND ISA Assessment Education Page

Description: Independent Security Assessment (ISA) Program Educational Site

education (19846) information (7854) protection (3472) military (2736) cybersecurity (2075) cyber (819) isa (252) phishing (194) authorized (129) state of california (17)

Example domain paragraphs

Sometimes phishers will recreate a logo or emblem they include if they feel it will add legitimacy to the message. Typically this only occurs if they are unable to make an existing logo work within their campaign because its time consuming. Tip: If something seems wrong, a quick search of Google Images for the companies logo should help.

Always Compare the displayed link address to its actual destination: Whether in an email or on a webpage, never take the URL displayed is where the link will take you or that it belongs to the appropriate organization. Tip: Take you mouse place it over this link www.bankofamerica.com | Now look in the footer of your browser window or the tool tip (depending on browser). Does it display: bankofamerica.com or hackers.xyz. Does the URL belong to the organization its repersents: Often attackers will register UR

Offers too good to be true? Often phishing emails offer impossible to obtain items, ridiculous discounts, or very short response intervals. This is designed to pressure you into clicking before you think. Tip: This is the same tactics used throughout time; I have a Bridge in New York ill get you a deal on? You're far more likely to not get what you think, scammed, or phished when these types of messages arrive. If you can't resist the deal, at least use what you learned in the Links section to try to valida