Remember to complete

Information Security Awareness Training

by June 22!


  • This short training series will reinforce how to identify malware ploys and email, phone and text scams.

  • Learn the do’s and don'ts of sharing information and more!


It will take about 45-60 minutes to complete the training. Each module may be taken individually at your convenience. 


The training is mandatory for all staff and partner consultants via the SafeSchools™ platform. Click here for detailed login instructions.

In stressful times like these, fraudsters take advantage of the chaos to steal our money and personal information.


Crooks are investing time to learn about their victims by reading posts on Facebook, LinkedIn, and Twitter. Then they send the victim a customized email with details about friends, family, and employers and links to dangerous websites that steal passwords or file attachments that take over the victim's computer. This is called “spear phishing.”


Here are six examples of spear-phishing emails, from the old “Nigerian Prince” scam to devious new ones now making the rounds.


Use the arrow button below the image to click from one example to the next.

Now take a minute to watch the video about ways to avoid becoming a spear-phishing victim. 

Click the arrow below to view. 

Why do so many employees fall for spear phishing?


Take the four-question cybersecurity quiz and find out. 

Here are six examples of spear-phishing emails. Click on the thumbnail image to download and print this PDF.

CPS | Spear Phishing.001.jpeg

Here are three recent cyber breaches you should know about: 

EasyJet: The British airline announced a breach revealing the travel details and email addresses of 9 million customers. Credit card information was exposed for just over 2,200 of these individuals, who were notified of the incident in April.


Home Chef: Meal-kit provider Home Chef recently disclosed a data breach impacting 8 million customers. Exposed information includes names, email addresses, phone numbers, encrypted passwords, and the last four digits of credit card numbers. Delivery frequency and other account-specific information may have also been compromised – those details could help scammers craft convincing phishing emails.


MobiFriends: Personal details of more than 3 million users of the dating app were posted online earlier this year and are now available for download. Some of this information includes email addresses, mobile numbers, dates of birth, gender information, usernames, and app/website activity.

Aware Force Cybersecurity News • June 2020 a • Edition #98

EasyJet, Home Chef, and MobiFriends logos are registered trademarks. 

Cybersecurity Cartoon ©

Original content © 2020 Aware Force LLC

Aware Force is a registered trademark