Let's Go Phishing
I'm Hit
Say What?
Who Am I
Self Control
100

The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information

What is Phishing

100

It's time to run your antivirus

What are steps to take when hit with Ransomware

100

Email Security Operations Center

What is how to report a security incident?

100

a person who uses computers to gain unauthorized access to data.

Who is a hacker

100

Use encryption or a password protected zip file

What is protecting a confidential message

200

Email from a public address, strange attachments, a sense of urgency, strange links, poor spelling and grammar

How do you detect phishing?

200

Contact the fraud department of each three credit bureaus,  File a report with police, Contact the creditors for any accounts that have been tampered with, Be Careful

What is what to do if victim of identity theft

200

Number of times your bank request a confirmation of your password or account number via email

What is Never

200

They protect our customers, employees, and Lowe’s sensitive data by reducing risks to Lowe’s through a proactive security program and strong collaboration with our partners

Who is the Lowe's Information Security Group

200

Say your password aloud, E-mail your password to an associate, Provide your assistant with your password.

What is what should you NOT do in order to protect your password.

300

The action you take if you receive an email from a very wealthy person that needs your help moving money across an international border

What is Delete the Email? 

or 

Report the attempt to the IT security office.

300

Email, Internet Download, Portable Media

What is the most common delivery method for viruses?

300

Contact your security team @ SOC@lowes.com

What is what to do if encountered a security event

300

A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.

What is a computer virus

300

A combination of upper and lowercase letters mixed with numbers and symbols.

What is a good way to create a password?

400

A Popup window says you have a virus and a button to click to click offering to resolve the issue.

What is don't click on it

400

A type of meat in a can, but also unsolicited junk email

What is Spam

400

Helps protect individuals from being victims of security incidents, Provides an understanding of steps to follow in the event of a security incident, Helps to understand levels of responsibility

What is a good understanding of Information Security policies and procedures?

400

A con artist – a person that will talk people into revealing passwords  or information that will compromise the company security

Who is a Social Engineer

400

Lock me before you leave for lunch or break

What is how to secure my computer

500

The best way to avoid viruses

What is don't open unexpected email from unknown sources

500

.EXE - Executable File, .BAT - Batch Processing, .VBS - VBScript Script File

What are file types that should never be opened

500

It goes from one server to the next to the next and finally is read by the recipient

What is an email

500

The weakest link in the security chain

Who is any human

500

Never leave your laptop unattended, Utilize a security cable or similar device and attach to a solid fixture in a conference room, Never check your laptop as luggage, Make sure your path trough the metal detector at the airport is clear Don’t be distracted by a decoy while  an accomplice grabs your computer laptop  At a hotel carry your laptop to the room don’t let the bellman carry it.

What are ways to protect your laptop away from the office

M
e
n
u