Skip to content

Commit 9bb22db

Browse files
authored
Merge pull request #50711 from v-thpra/azure-triage-fix-1055071
Technical Review 1055071: Securing you: Basics and beyond
2 parents c411c6a + 7688501 commit 9bb22db

File tree

11 files changed

+73
-73
lines changed

11 files changed

+73
-73
lines changed

learn-pr/security/securing-you-basics-beyond/1-introduction.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ uid: learn.securing-you-basics-beyond.1-introduction
33
metadata:
44
title: Introduction
55
description: Introduction
6-
ms.date: 04/26/2023
6+
ms.date: 05/29/2025
77
author: rmcmurray
88
ms.author: robmcm
99
ms.topic: unit

learn-pr/security/securing-you-basics-beyond/2-phishing.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ uid: learn.securing-you-basics-beyond.2-phishing
33
metadata:
44
title: Identify and protect yourself from phishing
55
description: Identify and protect yourself from phishing
6-
ms.date: 04/26/2023
6+
ms.date: 05/29/2025
77
author: rmcmurray
88
ms.author: robmcm
99
ms.topic: unit
@@ -41,4 +41,4 @@ quiz:
4141
explanation: "Perfect! Identifying the email as suspicious and not interacting with it are the best way to protect yourself from phishing."
4242
- content: "Don't open any attachments or click any links unless the email says you need to take immediate action."
4343
isCorrect: false
44-
explanation: "Attackers will use a false sense of urgency to get you to interact with their email."
44+
explanation: "Attackers use a false sense of urgency to get you to interact with their email."

learn-pr/security/securing-you-basics-beyond/3-passwords.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ uid: learn.securing-you-basics-beyond.3-passwords
33
metadata:
44
title: Passwords, passphrases, and secure storage of credentials
55
description: Passwords, passphrases, and secure storage of credentials
6-
ms.date: 04/26/2023
6+
ms.date: 05/29/2025
77
author: rmcmurray
88
ms.author: robmcm
99
ms.topic: unit
@@ -22,13 +22,13 @@ quiz:
2222
explanation: "This password is too simple and can be easily guessed or cracked."
2323
- content: "The word *password* with special characters and numbers mixed in."
2424
isCorrect: false
25-
explanation: "This is a common password variation that should never be used for any account."
25+
explanation: "This password is a common variation that should never be used for any account."
2626
- content: "A five-word passphrase with some numbers mixed in."
2727
isCorrect: true
2828
explanation: "Great! Having five different, unrelated words in a passphrase provides enough complexity to keep it from being guessed or cracked."
2929
- content: "Your birthday in numbers followed by your name."
3030
isCorrect: false
31-
explanation: "You should avoid creating a password that contains information that can be guessed, is associated with a social media account, or might already be available in other leaked account data."
31+
explanation: "You should avoid creating a password that contains information that can be guessed. You should also avoid a password associated with a social media account, or one that might already be available in other leaked account data."
3232

3333
- content: "What is the most secure approach to create a password when you're creating a new account?"
3434
choices:
@@ -37,10 +37,10 @@ quiz:
3737
explanation: "Though better than using the same password, simple passwords are easy to guess and can be easily cracked."
3838
- content: "Create a unique, long, complicated password or passphrase."
3939
isCorrect: true
40-
explanation: "Good job. The more complex your password is, the harder it will be for hackers to crack it."
41-
- content: "Reuse your favorite password, as long as you know it has not been exposed in a breach."
40+
explanation: "Good job. The more complex your password is, the harder it is for hackers to crack it."
41+
- content: "Reuse your favorite password, as long as you're sure it wasn't exposed in a breach."
4242
isCorrect: false
43-
explanation: "Never reuse any of your passwords, because one or more of them have already been stolen in a breach."
43+
explanation: "Never reuse any of your passwords, because chances are that one or more of them is already stolen in a breach."
4444
- content: "Use *correct horse battery staple*."
4545
isCorrect: false
4646
explanation: "Don't use any examples you read about. Always come up with your own, and make them as random as possible."

learn-pr/security/securing-you-basics-beyond/4-multi-factor-authentication.yml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ uid: learn.securing-you-basics-beyond.4-multi-factor-authentication
33
metadata:
44
title: Improve account security with multifactor authentication
55
description: Understand the basics of multifactor authentication, and how to use it for securing your identity.
6-
ms.date: 04/26/2023
6+
ms.date: 05/29/2025
77
author: rmcmurray
88
ms.author: robmcm
99
ms.topic: unit
@@ -22,23 +22,23 @@ quiz:
2222
explanation: "As implied by *multifactor*, more than one factor is required."
2323
- content: "Two"
2424
isCorrect: True
25-
explanation: "Yes, this is the minimum number of factors required for supporting multifactor authentication."
25+
explanation: "Yes, two is the minimum number of factors required for supporting multifactor authentication."
2626
- content: "Three"
2727
isCorrect: false
28-
explanation: "Though this makes accessing your account more secure, the minimum number of factors needed for multifactor authentication is two."
28+
explanation: "Using three factors makes accessing your account more secure, but the minimum number of factors needed for multifactor authentication is two."
2929
- content: "Zero"
3030
isCorrect: false
3131
explanation: "At least two factors are needed for multifactor authentication. Zero factors means you don't have a password."
3232

3333
- content: "When should you use multifactor authentication?"
3434
choices:
35-
- content: "Only for securing financial accounts"
35+
- content: "Only for securing financial accounts."
3636
isCorrect: false
37-
explanation: "You should not restrict use of multifactor authentication to just one type of account."
38-
- content: "Only for securing access to a password manager"
37+
explanation: "You shouldn't restrict use of multifactor authentication to just one type of account."
38+
- content: "Only for securing access to a password manager."
3939
isCorrect: false
40-
explanation: "Though this is probably the most important thing to secure by using multifactor authentication, you should consider even more options."
41-
- content: "For all your accounts, and wherever you can use multifactor authentication"
40+
explanation: "A password manager is probably the most important thing to secure by using multifactor authentication, but you should consider even more options."
41+
- content: "For all your accounts, and wherever you can use multifactor authentication."
4242
isCorrect: true
4343
explanation: "The best option is to use multifactor authentication wherever it's available."
4444
- content: "Never"

learn-pr/security/securing-you-basics-beyond/5-summary.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ uid: learn.securing-you-basics-beyond.5-summary
33
metadata:
44
title: Summary
55
description: Summary
6-
ms.date: 04/26/2023
6+
ms.date: 05/29/2025
77
author: rmcmurray
88
ms.author: robmcm
99
ms.topic: unit

learn-pr/security/securing-you-basics-beyond/includes/1-introduction.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,17 +3,17 @@ Staying secure online is a challenge. The internet and the devices connected to
33
Think about the internet as a neighborhood where you do common tasks such as email, banking, or shopping. Then think about who your neighbors are. Some of these neighbors are dangerous. They include:
44

55
- Organized crime gangs intent on stealing personal account information.
6-
- Hackers who will use your computer to attack other victims.
6+
- Hackers who use your computer to attack other victims.
77
- Automated downloads that install ransomware to keep you from using your computer until you pay (or until you restore from a backup).
88
- Government-backed hackers who might be on a mission to steal intellectual property or destabilize governments.
99

10-
Most of your online activity probably doesn't directly expose you to crime. But odds are good that you know someone who's been a victim of some kind of computer-related crime, like computer viruses, malware, identity theft, or data breaches. If it hasn't happened to you and if you don't protect yourself, it's just a matter of time before you'll be directly affected. What can you do to keep yourself safe, without having to be a cybersecurity expert?
10+
Most of your online activity probably doesn't directly expose you to crime. But the odds are good that you know someone who was a victim of some kind of computer-related crime, like computer viruses, malware, identity theft, or data breaches. If you don't protect yourself, it's just a matter of time before you're directly affected. What can you do to keep yourself safe, without having to be a cybersecurity expert?
1111

12-
Securing your passwords, account information, and other sensitive data might be easier than you think. We'll show you techniques and tools that you can use to protect yourself from the most common threats.
12+
You might find that keeping your passwords, account information, and other sensitive data secure is easier than you think. We show you techniques and tools that you can use to protect yourself from the most common threats.
1313

1414
## Learning objectives
1515

16-
By the end of this module, you'll be able to:
16+
By the end of this module, you're able to:
1717

1818
- Identify common threats to your online identity and account data.
1919
- Apply techniques to recognize and avoid phishing.

learn-pr/security/securing-you-basics-beyond/includes/2-phishing.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
Imagine you're looking through your email and you see what looks like an alert from one of your social media accounts. Everything looks official. It asks you to sign in to your account and verify that your contact information is correct. You click the link in the email and sign in to what looks like your account.
22

3-
Unfortunately, in that moment, an attacker has successfully stolen your account sign-in information.
3+
Unfortunately, in that moment, an attacker successfully steals your account sign-in information.
44

55
This email-based *social engineering* technique is called *phishing*. Attackers use this technique often, sending [over a billion phishing emails every year.](https://www.microsoft.com/security/blog/2018/10/17/how-office-365-learned-to-reel-in-phish/?azure-portal=true)
66

@@ -14,21 +14,21 @@ Phishing email is written to convince you to do one of two things:
1414
- Open an attachment that runs a dangerous program.
1515

1616
> [!NOTE]
17-
> In this training, the term *click a link* is used to represent clicking a link with a mouse, tapping a link on a phone, or using any other type of assistive or other device to activate a link.
17+
> In this training, the term *click a link* is used to represent clicking a link with a mouse, tapping a link on a phone, or activating a link on any other type of device.
1818
1919
One of the most common phishing goals is to collect your personal information, such as your username and password. If the attacker is successful, they'll use your stolen information to access your account and any other accounts where you use that same username and password.
2020

2121
Another common phishing goal is to deliver malicious software, called *malware*. Opening one of these dangerous attachments can result in running a program that harms your computer. Such a program might even lock you out of your computer unless you pay a ransom. This malware is known as *ransomware*.
2222

23-
Phishing is one of the most common threats on the internet. In 2019 alone, the [FBI's Internet Crime Complaint Center (IC3) reported more than 450,000 complaints and more than $3.5 billion in losses to individuals and businesses](https://www.fbi.gov/news/stories/2019-internet-crime-report-released-021120?azure-portal=true). This data represents only a small number of the actual cases. In other words, phishing is a popular and successful way for a criminal to steal your data.
23+
Phishing is one of the most common threats on the internet. In 2019 alone, the [FBI's Internet Crime Complaint Center (IC3) reported more than 450,000 complaints and more than $3.5 billion in losses to individuals and businesses](https://www.fbi.gov/news/stories/2019-internet-crime-report-released-021120?azure-portal=true). This data represents only a few of the actual cases. In other words, phishing is a popular and successful way for a criminal to steal your data.
2424

2525
:::image type="content" source="../media/2-phishing-stats.png" alt-text="Diagram that shows phishing statistics: 92.4% of malware is delivered via email, 30% of received phishing messages are opened, and 12% of those users click the malicious link or open the attachment.":::
2626

2727
## Why does phishing work so often?
2828

2929
Phishing is designed to be believable. Attackers have been using the same approach since the first phishing emails were sent in the 1990s. They often try to take advantage of your good nature, your desire to help, or your desire to solve a problem.
3030

31-
Attackers know what emotions get people to respond. For example, they might send an email to get you to click a link by telling you something needs to happen urgently. One common example is an email that says your account has been closed. Although this might seem like something serious at first, remember that most businesses won't send you an email that says they've closed your account with no warning.
31+
Attackers know what emotions get people to respond. For example, they might send an email to get you to click a link by telling you something needs to happen urgently. One common example is an email that says your account has been closed. Although this message might seem like something serious at first, remember that most businesses won't send you an email that says they've closed your account with no warning.
3232

3333
Another common approach is to offer something too good to be true. Attackers will tell you that you've won an award or that they need you to manage their large sums of money.
3434

@@ -45,16 +45,16 @@ First, recognize phishing! The following video has some guidance on what to look
4545
Here are some common features of phishing attacks:
4646

4747
- **Attachments**: If your email has an attachment that you don't expect, it might be phishing, and that attachment might be dangerous.
48-
- **Unusual hyperlinks**: Be aware of any links in emails. If you hover over a link and the destination looks odd, it might be a dangerous website. A website might look just like a legitimate one, but be designed to capture your login information or run malware.
48+
- **Unusual hyperlinks**: Be aware of any links in emails. If you hover over a link and the destination looks odd, it might be a dangerous website. A website might look just like a legitimate one, but be designed to capture your sign-in information or run malware.
4949
- **Urgency**: If a message says you need to do something *right now*, it might be a phishing email. Remember, your bank usually doesn't reach out to you with no warning by using an email subject about canceling your accounts.
5050
- **Bad spelling or grammar**: Phishing emails are often full of unusual writing, spelling errors, and grammar errors. If the email looks suspicious, you should avoid interacting with it.
5151
- **Fake sender**: If the email address looks unusual or is someone you don't recognize, you should treat it as a phishing email.
5252

5353
The following example email has all of these features.
5454

55-
:::image type="content" source="../media/2-phishing-email.svg" alt-text="Sample email that shows common signs of phishing, including fake email addresses, unexpected attachments, urgent messaging, bad links, and poor grammar.":::
55+
:::image type="content" source="../media/2-phishing-email.svg" alt-text="Sample email that shows common signs of phishing. Including, fake email addresses, unexpected attachments, urgent messaging, bad links, and poor grammar.":::
5656

57-
Now that you can recognize phishing email and you know not to click any links or open any attachments, let's talk about what else you can do. Your email application or website probably has the *report phishing* feature. Using this feature will notify the email provider and help prevent similar email in the future. Of course, you can delete phishing email too.
57+
Now that you can recognize phishing email and you know not to click any links or open any attachments, let's talk about what else you can do. Your email application or website probably has the *report phishing* feature. Using this feature will notify the email provider and help prevent similar email in the future. Or, you can delete phishing email yourself.
5858

5959
If you aren't sure about an email from a friend or family member, you still don't need to click any links or open any attachments. You can give them a call or send a text message and ask if they sent you anything.
6060

0 commit comments

Comments
 (0)