The fraudulent practice of sending emails or other messages purporting to be from reputable sources.
What is Phishing?
The minimum required length of a password for HH employees.
(Bonus 100pts if you can name other requirements)
What is 8 characters?
(Bonus: at least 1 Lowercase, 1 Uppercase, 1 Number, and 1 Symbol)
Technology used to access our building's elevators, gym door, garage door.
What is Radio Frequency Identification (RFID)?
An easy way to get your work device stolen.
What is leaving it unattended in public/leaving it visible in the car (especially in the Bay Area)?
Around 1987 is the birth year of commercial antivirus, the same year Mcafee was founded. The title of Taylor's album named after a year in the same decade.
What is 1989?
A type of malicious software designed to block access to a computer system until a sum of money is paid.
What is Ransomware?
The number of days before you are required to change your password.
What is 90 days?
Tech that was provided as a sticker to access our main door.
What is Near Field Communication (NFC)?
This helps you work securely when working remote/in a public space.
What is connection to the Harmless Harvest VPN?
Your password was compromised because it was "password". You changed it to "Password!". Taylor's lyric that applies to what you did. (Hint: Bad Blood)
What is "band-aids don't fix bulletholes..."?
Type of malicious software that infects a computer or other device and collects information about a user’s web activity without their knowledge or consent.
What is Spyware?
Authentication method that requires the user to provide two or more verification factors to gain access to a resource. (Bonus 100pts if you can name which app we use)
What is Multi-Factor Authentication (MFA)?
(Bonus: Microsoft Authenticator App)
Form of unsecure password storage that'll allow potential attackers to easily steal your password.
What is writing my password on a sticky note?
Recommended method of storing work files/documents.
What is saving work to OneDrive/Sharepoint?
Taylor song lyric that describes a perfectly written and executed phishing email.
(Hint: Blank Space)
What is "'cause darling I'm a nightmare dressed like a daydream"?
An attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems.
What is a Social Engineering attack? (Latest MGM attack)
The Cyber Security platform that we use.
What is Sophos Cybersecurity?
Way to secure your laptop when leaving your desk
What is locking my screen?
A good practice to avoid phishing emails.
What is double-checking the sender's email?
You've trained yourself to be great at spotting phishing emails. Taylor Swift song lyric you say when you easily spot a suspicious email and report it immediately as junk/phishing.
What is "I knew you were trouble when you walked in"?
A cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other, as the attacker has inserted themselves between the two parties.
What is a Man-in-the-middle attack?
The email to reach the Helpdesk
What is ushelpdesk@harmlessharvest.com?
First order of action when a work device gets lost/stolen.
What is reporting to ushelpdesk@harmlessharvest.com and manager/colleague?
Assume this is the weakest link in every cybersecurity incident.
Who am I/What is you?
Taylor Swift song lyric that describes the weakest link in a cybersecurity incident.
What is "it's me, hi! I'm the problem, it's me"?