The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information
What is Phishing
It's time to run your antivirus
What are steps to take when hit with Ransomware
Email Security Operations Center
What is how to report a security incident?
a person who uses computers to gain unauthorized access to data.
Who is a hacker
Use encryption or a password protected zip file
What is protecting a confidential message
Email from a public address, strange attachments, a sense of urgency, strange links, poor spelling and grammar
How do you detect phishing?
Contact the fraud department of each three credit bureaus, File a report with police, Contact the creditors for any accounts that have been tampered with, Be Careful
What is what to do if victim of identity theft
Number of times your bank request a confirmation of your password or account number via email
What is Never
They protect our customers, employees, and Lowe’s sensitive data by reducing risks to Lowe’s through a proactive security program and strong collaboration with our partners
Who is the Lowe's Information Security Group
Say your password aloud, E-mail your password to an associate, Provide your assistant with your password.
What is what should you NOT do in order to protect your password.
The action you take if you receive an email from a very wealthy person that needs your help moving money across an international border
What is Delete the Email?
or
Report the attempt to the IT security office.
Email, Internet Download, Portable Media
What is the most common delivery method for viruses?
Contact your security team @ SOC@lowes.com
What is what to do if encountered a security event
A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
What is a computer virus
A combination of upper and lowercase letters mixed with numbers and symbols.
What is a good way to create a password?
A Popup window says you have a virus and a button to click to click offering to resolve the issue.
What is don't click on it
A type of meat in a can, but also unsolicited junk email
What is Spam
Helps protect individuals from being victims of security incidents, Provides an understanding of steps to follow in the event of a security incident, Helps to understand levels of responsibility
What is a good understanding of Information Security policies and procedures?
A con artist – a person that will talk people into revealing passwords or information that will compromise the company security
Who is a Social Engineer
Lock me before you leave for lunch or break
What is how to secure my computer
The best way to avoid viruses
What is don't open unexpected email from unknown sources
.EXE - Executable File, .BAT - Batch Processing, .VBS - VBScript Script File
What are file types that should never be opened
It goes from one server to the next to the next and finally is read by the recipient
What is an email
The weakest link in the security chain
Who is any human
Never leave your laptop unattended, Utilize a security cable or similar device and attach to a solid fixture in a conference room, Never check your laptop as luggage, Make sure your path trough the metal detector at the airport is clear Don’t be distracted by a decoy while an accomplice grabs your computer laptop At a hotel carry your laptop to the room don’t let the bellman carry it.
What are ways to protect your laptop away from the office