Facebook, Twitter, Instagram, and Snapchat are all examples of this.
What is social media?
The method used by hackers via emails or messages that trick people into sharing private information.
What is phishing?
All tech devices should have one of these in order to help protect user information. These should not be shared with anyone. They should also be different for personal online accounts and business online accounts. They're typically recommended to be changed every 90 days.
What is a password?
These are people who originally tried to gain access into computers for intellectual curiosity, but now have malicious purposes.
Who are hackers?
These are the people responsible for the security of information within an organization.
Who is everyone in the organization?
Online offers that sound too good to be true are called ____. Some examples include: Get Rich Quick schemes, Genovian Princes asking for money, provocative posts suggesting friends have been talking about you.. etc
What are scams?
These are two actions that you should take when you receive a phishing email.
(Hint: Not click on any ____, and ____ the email)
What is to not click on any links and report the email?
Whenever you leave your computer, even for a few minutes, you should perform this action.
What is (to) lock your computer?
Hackers make these computer programs so that the program may spread or self-replicate. The program requires user interaction to activate it. It will make your computer slow down or become unusable.
What is a virus?
The weakest link in all security networks or computer systems.
Who am I? OR Who are people? Who is the user?
The action of letting someone walk into a secure area behind you without a badge.
What is "tailgating" or "piggybacking"?
Bad grammar, poor spelling, an unknown sender, a phishy link to click, expressed urgency, or a request for personal information are all examples of these.
What are indications of a phishing email?
These items can be carried with you. When they're not properly password protected, that can result in a cyber security breach. This is especially true when the items belong to a company.
What are assets or devices? (laptops, cellphones, flash drives)
Movie from the 90's starring Angelina Jolie related to hacking.
What is Hackers, (1995)?
According to HIPPA, system rights are given to people on a ____-__-____ basis.
What is a need-to-know basis?
This is an action taken by hackers looking to steal identifiable information out of your garbage.
What is dumpster diving?
You can check the address of an embedded link using this procedure.
What is to hover your mouse/cursor over the link?
This is the term used to describe a strong password that uses a combination of numbers and letters.
What is an alphanumeric password?
This type of malware prevents users from accessing their system by locking them out until the user pays the hacker for the key.
What is ransomware?
The action of watching (either in person or by using a recording device) what a user does on their computer by looking at the screen while standing behind the user.
What is shoulder surfing?
People are tricked into breaking security protocols or giving access to important information without realizing it. This may take the form of impersonation via telephone, in person, or email.
What is social engineering?
3 things you should never provide to a phishy email.
What are users IDs, passwords, and personal information, DOB, SS, PHI, PII, Confidential information, Financial information?
These are the first 8 characters you should see on a website address to make sure it is secure.
What are h-t-t-p-s-:-/-/?
OR
What is https://?
These malware programs track where you go on the Internet and what you type into your keyboard.
What is spyware?
This former subcontractor for the NSA stole a lot of confidential data and put it out into the world. They are likely the most famous example of an insider threat.
Who is Edward Snowden?