Attacks
Harmless Policies
Physical Security
Best-Practices
Taylor Swift
100

The fraudulent practice of sending emails or other messages purporting to be from reputable sources.

What is Phishing?

100

The minimum required length of a password for HH employees.
(Bonus 100pts if you can name other requirements)

What is 8 characters?
(Bonus: at least 1 Lowercase, 1 Uppercase, 1 Number, and 1 Symbol)

100

Technology used to access our building's elevators, gym door, garage door.

What is Radio Frequency Identification (RFID)?

100

An easy way to get your work device stolen.

What is leaving it unattended in public/leaving it visible in the car (especially in the Bay Area)?

100

Around 1987 is the birth year of commercial antivirus, the same year Mcafee was founded. The title of Taylor's album named after a year in the same decade.

What is 1989?

200

A type of malicious software designed to block access to a computer system until a sum of money is paid.

What is Ransomware?

200

The number of days before you are required to change your password.

What is 90 days?

200

Tech that was provided as a sticker to access our main door.

What is Near Field Communication (NFC)?

200

This helps you work securely when working remote/in a public space.

What is connection to the Harmless Harvest VPN?

200

Your password was compromised because it was "password". You changed it to "Password!". Taylor's lyric that applies to what you did. (Hint: Bad Blood)

What is "band-aids don't fix bulletholes..."?

300

Type of malicious software that infects a computer or other device and collects information about a user’s web activity without their knowledge or consent.

What is Spyware? 

300

Authentication method that requires the user to provide two or more verification factors to gain access to a resource. (Bonus 100pts if you can name which app we use)

What is Multi-Factor Authentication (MFA)?
(Bonus: Microsoft Authenticator App)

300

Form of unsecure password storage that'll allow potential attackers to easily steal your password.

What is writing my password on a sticky note?

300

Recommended method of storing work files/documents.

What is saving work to OneDrive/Sharepoint?

300

Taylor song lyric that describes a perfectly written and executed phishing email.
(Hint: Blank Space)

What is "'cause darling I'm a nightmare dressed like a daydream"?

400

An attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems.

What is a Social Engineering attack? (Latest MGM attack)

400

The Cyber Security platform that we use.

What is Sophos Cybersecurity?

400

Way to secure your laptop when leaving your desk

What is locking my screen?

400

A good practice to avoid phishing emails.

What is double-checking the sender's email?

400

You've trained yourself to be great at spotting phishing emails. Taylor Swift song lyric you say when you easily spot a suspicious email and report it immediately as junk/phishing.

What is "I knew you were trouble when you walked in"?

500

A cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other, as the attacker has inserted themselves between the two parties.

What is a Man-in-the-middle attack?

500

The email to reach the Helpdesk


What is ushelpdesk@harmlessharvest.com?

500

First order of action when a work device gets lost/stolen.

What is reporting to ushelpdesk@harmlessharvest.com and manager/colleague?

500

Assume this is the weakest link in every cybersecurity incident.

Who am I/What is you?

500

Taylor Swift song lyric that describes the weakest link in a cybersecurity incident.

What is "it's me, hi! I'm the problem, it's me"?

M
e
n
u