Bucket 1
Bucket 2
Bucket 3
100

Acts as a barrier between Livent's internal network and the external forces that are trying to gain illegal access.

Human Firewall

100

The fraudlulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity in an electronic communication.

Phishing

100
An authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence to an authentication.

Multi-factor Authentication

200
True or False. Manufacturing is now the 2nd most targeted industry.

True

200

Before clicking you should...

Stop. Look. Think

200
What is the current #1 cybersecurity threat, it is the fastest growing type of cybercrime.

Ransomware

300

What are the three color-coded banners used to differentiate caution in emails?

Grey, Yellow, Red

300

What is the correct action to take if you receive a suspicious email?

Click 'Report This Email', located directly below the banner in the email

300

__ % of cybersecurity breaches are caused by human error?

95%

M
e
n
u