The Basics
Phishing
Cyber Breach
BYOD
Popourri
100

These are the weakest link in every company's cyber security plan.

Who are the employees?

100

In this type of attack, you receive an email from a Nigerian prince asking you to give him bank account information so he can share the million dollars he has in an account that he must transfer somewhere to retrieve.

What is an email scam/phishing?

100

The free Starbucks wi-fi is an example of this. 

What is an unsecure network?

100

Personal laptops are authorized for doing Amify work.(true or false)

What is False?

100

In December 2013, thieves hacked as many as 40 million customer credit card accounts, and up to 110 million sets of personal information such as email addresses and phone numbers were stolen from this retailer.

What is Target?

200

{Ctrl+alt+delete} + enter is one way to do this

What is lock your computer screen?

200

Examples of these include: Bad grammar, All CAPS, a link to click so that you can update your information, or a request for personal information 

What are things you should look for in an email that may indicate it is a scam/Phishing?

200

This image in the address bar of your web browser indicates you are on a secure website.

What is the lock icon?

200

Mobile phones used for work purpose require one of these locking mechanisms. 

What is PIN or biometric ID?

200

Contact the IT/Engineering department and your direct supervisor, and power off your computer are steps you should take if this occurs.

What is a computer malware infection?

300

Your birthday, your name, dictionary words, or 1234 are all examples of what?

What are bad password/ bad password practices? 

300

Someone calling as a vendor asking you to re-send the company credit card information over the phone could be this.

What is social engineering?

300

Items which are carried with you, when not properly secured or scanned can result in a cyber security breach.

What are portable devices, such as laptops, cell phones, and flash drives?

300

BYOD Policy applies to personal cell phones used for work. (true or false)

What is true?

300

In this type of attack you might click on an email from your mortgage company, log in like normal, and end up giving your credentials to a hacker.

What is a man in the middle attack?

400

This is what you do when your Amify computer, email, or systems have been compromised.

What is submit an IT incident Report on the IT Help Portal?

400

When you receive an email with a link in it, you are advised to open a separate browser and type (or retrieve from favorites) the URL you already know for the website instead of clicking on the link in the mail.

What is one way to verify a scam email link?

400

Plugging your phone into your laptop could result in what?

What is an unauthorized data transfer or data breach?

400

With an outlet or power strip.

What should you use to charge your mobile devices?

400

Marie signed up for a Groupon using her Amify email account. 

What is an improper use of company email?

500

Gaming, Gambling, pornography, and posting discriminatory messages

What are unauthorized uses of the Amify network?

500

This type of attack is a more sophisticated and appears to come from inside the organization. 

What is a Spear Phishing attack?

500

When a mobile device or machine with Amify data is lost, the company reserves the right to do this.

What is remote swipe the device?

500

Your three-year old is amazingly good at unlocking your phone and opening apps.

Multiple Correct Responses:

What is why family members should not have access to work phones OR 

What is another reason two factor authentication for oneLogin is required OR 

What is another reason biometric ID and passcode are required on mobile devices?

500

You should always do this as a bare minimum on your home computer to protect it from malware.

What is install anti-virus protection software?

M
e
n
u