Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Pishing

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 16

THE PRESENTERS:

CAME S. POTENTE
Candidate, BSBA Marketing Management
College of Business Administration and Accountancy
Mindanao State University – Main Campus
Marawi City

ABDUL HAKIM M. IBRAHIM


Candidate, BSBA Marketing Management
College of Business Administration and Accountancy
Mindanao State University – Main Campus
Marawi City
PHISHING SCAM: EFFECT TO THE COMPANY’S
REPUTATION AND ITS CONSEQUENCE FOR
MARKETERS
INTRODUCTION
PHISHING SCAM
COVID 19 is the catalyst of digitalization. With it, comes the increase of
cases of Phishing Scam in the Philippines.

It is detrimental to the company’s image and marketers, being the


guardian of the brand and as communicators, have a big role in
spreading awarenes.

This paper aims to spread awareness about Phishing Scam, its effect
to the company, how to avoid it and what to do if one fall for it.
BODY
This study make used of the various literatures
in order to:
 Understand what a phishing scam is;
 Figure out its effect to the company’s image;
 Find ways to avoid it; and
 Find tips on what to do if one fell for it.
WHAT IS PHISHING SCAM?
 A type of social manipulation assault that is
frequently used to get sensitive information from
customers
 Cyberattack in which a person mimicking a genuine
entity sends an email, phone call, or text message
to a target or targets to entice them to provide
confidential material
5COMMON TYPES OF PHISHING SCAMS
 EMAIL PHISHING
 HTTPS PHISHING
 SPEAR PHISHING
 WHALING OR CEO FRAUD
 POP UP PHISHING
 It has been around since the
1990s.
 Hackers send these emails to
whatever address they can get
EMAIL PHISHING
their hands on.
 Links lead to phishing websites
that steal credentials or install
malware
 Nothing prevents fraudsters
from abusing the HTTPS
protocol to launch more
ostensibly trustworthy
HTTPS PHISHING assaults.
 An email looks to come
from a trustworthy source,
but it leads the unknowing
recipient to a malicious
SPEAR PHISHING website.
 Focuses on a specific
individual, corporation, or
organization
A whale phishing attack is a
cyber attack in which hackers
pose as members of a
WHALING OR CEO company's top management
FRAUD team or other high-ranking
individuals in order to steal
money or get access to
confidential information for
malicious purposes.
Pop-up phishing is a sort of
phishing scam in which
victims are duped into
installing malware or
POP UP PHISHING acquiring security software
they don't need.
Effects of Phishing Attacks on Companies

Reputational Loss of Loss of Regulatory Business


Damage Customers Company Value Fines Disruption
• company's • Customers get • Breach affects • For decades, • No matter
reputation frightened more than financial how little the
quickly suffers when they simply sanctions have breach, it
damage upon learn about a customer trust. been in effect eventually
the news of a data breach. for data results in
data breach. misuse or company
mishandling. interruption.
Never open Avoid clicking
emails that on dodgy links
appear to be included in
suspicious. emails.
HOW TO
PREVENT
Avoid sending Avoid clicking
FALLING INTO financial details on pop-up
A PHISHING through email. advertisements.
ATTEMPT?
Subscribe to
Make use of
anti-virus
spam filters.
protection.
Report the scam to authorities

WHAT TO DO Disconnect your devices


IF YOU FALL Use antivirus and antimalware solution
FOR A
Update your passwords
PHISHING
SCAM? It's important to have backup

Stay up to date
FINDINGS & CONCLUSIONS
Awareness about phishing scam is crucial in every
organization and marketers as communicator plays an important
role in raising awareness. Falling prey on a phishing attempt would
tarnish the brand reputation and will have a lingering effect to the
company. A decrease in productivity, customer’s trust, company
value and an increase of cost will be felt by the company.
This webinar paper would teach you the value of knowledge,
privacy and carefulness. There are people who are so good at
fooling other people, so you must always think before you trust.
Digital world is just as scary as the real world.
FINDINGS & CONCLUSIONS

However, this paper only focuses on defining phishing, its


different types and how to avoid being a victim, its effect to the
company’s image and the things to do if ever one fall prey to a
phishing attack but it didn’t discuss much about the anti-virus
software that could prevent malwares from entering one’s device.
Future researchers could study about the different antivirus
software and its effectiveness.

You might also like