12345678
Good or Bad password?
BAD!!!!!!!!!!!!!!!!!!
65% of Cybercriminal groups used this type of attack as the primary infection vector.
spear-phishing
43% of all breeches are_________ threats, either intentional or unintentional.
"Insider threats"
48% of malicious email attachements are _____________file types.
Office document file types. i.e. .doc, .xlsx.
What is cloud computing?
the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer
What all should a password consist of?
What is social engineering?
Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme.
Why is physical security important?
It is important to practice physical security because that can make gaining access to the system just as easy as a cyber breach. Also some deal with a good number of PII paper documents. Example breaking in physically increases the chance of finding an unlocked computer provides the opportunity to print off a list of passwords saved in OneDrive.
What should you do if you were to find a 32 GB USB thumb drive laying around in the office?
Bring it to UMF HelpDesk. Tey have methods and tools to safely check and scan the thumb drive, and get it back to the original owner if needed.
$___________is lost every minute due to a phishing attack.
$17,700 in the USA.
Should your password contain personal information people can find or reference via instagram, Facebook, or Twitter?
No. Hackers often will research their targets and generate lists of possible passwords after browsing through your social media.
What is phishing?
the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
What should you do before leaving your office or cubicle, at Home OR on Campus?
Before you leave your desk/office, make sure your computer is locked and no sensitive information is out. Locked office door is acceptable as well.
If you find that your computer has been infected, what should your next steps be?
Call the helpdesk immediately.
Unplug the ethernet cord, turn off wireless.
Shutting your computer down is also acceptable.
The average cost of a data breach in 2021 was $____________.
$4.24 Million dollars
What is the UMF's Security Team's favorite tool for Password managment?
LastPass
What is the difference between spear phishing and phishing?
Phishing is doing fraudulent practices and sending them out to multiple people for a response and spear phishing means they have researched and targeted you specifically and is harder for you to detect. Netflix phish vrs. UMF fake cindy email.
What is physical security?
Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution. Use griz card for entry.
What is malware?
Malicious software meant to damage your computer and/or your computer systems.
The average life cycle of a breach in 2021 was ____________ days from identification to containment.
286 days.
Give an example of a strong password (not one that you are using or have used...)
Example
- Not personal
at least 12 characters
consists of numbers, special characters, and letters ( upper and lower )
What is Human Error.
What is the likelihood that a cybercrime entity is detected and prosecuted in the U.S.?
is estimated at around 0.05 percent.
What is a firewall and why do we use one?
a part of a computer system or network which is designed to block unauthorized access while permitting outward communication
We use one to prevent any kind of cyber attack and to keep our member's information safe
More than double any other country, the US was the target of ____% of cyberattacks in 2020.
46%