Cyber Security Awareness Poster

Weaponized documents are an example of attacks that can come from a web download, a shared drive, or a file attached to a legitimate looking email. Many types of documents can be compromised, including PDFs, Excel, Word or other Microsoft Office documents. Hackers will put code, links, or even videos into these documents that covertly release malware, trojans, ransomware or even remote access software onto a system or network. Even though most weaponized documents start with an email, they are even more dangerous because most traditional anti-phishing email products won’t identify the malicious phishing attack when its downloaded through shared drives, PDFs, Excel, Word or other Microsoft Office documents.
Use email best practices to avoid falling victim to this type of attack.
- Don’t click on or download attachments from unknown senders.
- Permanently delete suspicious emails from your inbox and the server.
- Report suspicious activity to IT.
CourseVector grants permission to use this artwork for any non-commercial purpose as long as the CourseVector contact information remains, as is, on any reproduction or use.