// MODULE 04 OF 04

BEST PRACTICES

Knowledge without action is vulnerability. Build the habits and defenses that make phishing attacks fail — every time.

+100 XP ON COMPLETION

Your Personal Security Stack

Think of your security like layers of armor. A single layer can be pierced. Multiple layers mean attackers must break through all of them.

🔐
LAYER 1 — MULTI-FACTOR AUTHENTICATION (MFA)

Enable MFA on every account. Even if an attacker steals your password via phishing, they can't log in without the second factor. Use an authenticator app (Google Authenticator, Microsoft Authenticator) — SMS is better than nothing but can be intercepted via SIM-swapping.

🔑
LAYER 2 — PASSWORD MANAGER

Use a password manager (Bitwarden, 1Password) to generate and store unique, complex passwords for every site. Password managers also autofill only on legitimate domains — they won't fill in your credentials on a fake site, giving you a passive layer of phishing protection.

🌐
LAYER 3 — BROWSER SECURITY

Keep browsers updated. Use extensions like uBlock Origin to block malicious ads. Bookmark important sites (bank, payroll, email) and always navigate from bookmarks — never from email links.

📧
LAYER 4 — EMAIL HABITS

Never click links in unexpected emails. Navigate directly to the site instead. Report suspicious emails using your company's phishing report button. Never open attachments from unknown senders — especially .exe, .zip, .docm files.

📞
LAYER 5 — VERIFY BEFORE YOU ACT

Any request for money, credentials, or sensitive data — regardless of who it seems to be from — must be verified out-of-band (a separate communication channel). Call the person directly. Never use contact info from the suspicious message itself.

⚡ If You Think You've Been Phished

Don't panic. Speed matters — act fast and follow these steps:

1Don't enter any more information. Close the tab immediately if you're on a fake site.
2Change your password immediately on the real site — use a different device if possible.
3Enable or re-verify MFA on the account in question.
4Report it to your IT/security team immediately. Include the email or link. Don't delete it — they need it for investigation.
5Check for unauthorized activity — bank transactions, sent emails, account logins.
6If malware may have been installed, disconnect from the network and contact IT. Don't try to fix it yourself.
💡 Reporting a phishing attempt — even if you clicked — is NEVER shameful. It helps protect your whole organization. The people who don't report are the actual risk.

Quick Reference Checklist

Before clicking any link or providing any information, run through this checklist:

// KNOWLEDGE CHECK