AWARENESS

Cyber Awareness for Everyone

This section focuses on everyday cyber safety. It helps users recognize threats, understand attacker behavior, and apply simple actions to reduce cyber risk.


Common Online Threats

Phishing Attacks
Deceptive emails or messages designed to steal personal or financial information.

Social Media Scams
Fake profiles, malicious links, and impersonation attempts on social platforms.

Malware & Ransomware
Malicious software that can steal data, damage systems, or lock files.


Online Safety Tips

  • Use strong and unique passwords

  • Enable two-factor authentication where possible

  • Avoid clicking unknown or suspicious links

  • Verify websites before entering personal information

  • Keep systems and applications updated


Awareness for Students & Families

Cyber awareness is especially important for students and families. This section highlights safe internet use, protecting privacy, recognizing online fraud, and guiding children toward responsible digital behavior.

Type of Phishing

 

 

 

 

Phishing is a type of cyberattack in which attackers send fraudulent emails, messages, or links that appear to originate from trusted sources. The goal is to trick users into revealing sensitive information such as passwords, banking details, or personal data.

Phishing attacks often pretend to be from:

  • Banks or financial institutions

  • Government organizations

  • Email or social media platforms

  • Online shopping or service providers

Example of Phishing

You may receive a message saying:

“Your account has been suspended. Click here to verify your details immediately.”

The link usually leads to a fake website designed to steal your information.

Common Signs of Phishing

  • Urgent or threatening messages

  • Unknown or suspicious sender addresses

  • Requests for passwords, OTPs, or personal details

  • Poor spelling or grammar

  • Suspicious links or attachments

What Is Spear Phishing?

Spear phishing is a more targeted and sophisticated form of phishing. Instead of sending random messages to many people, attackers carefully select a specific individual, group, or organisation.

They use personal information to make the message look legitimate and trustworthy.

How Spear Phishing Works

Attackers may collect information from:

  • Social media profiles

  • Company websites

  • Public records or online posts

They then send a personalised message that appears relevant to the victim.

Example of Spear Phishing

An employee receives an email saying:

“Hi Joe, please review the attached invoice discussed in yesterday’s meeting.”

Because the message sounds familiar and specific, the victim may unknowingly open a malicious attachment or link.

Scroll to Top