THE BASICS
LOCK IT UP!
PHISHING, VISHING, & SMISHING - OH MY!
RISKY HABITS
100

Employee addresses, new product ideas and donation amounts are all examples of this type of information

What is confidential?

100

A thumb or fingerprint is an example of this

What is biometric MFA?

100

Examples of this “malicious" software include viruses, worms, ransomware and spyware

What is malware?

100

Ignoring these can leave your device, applications and software vulnerable to attacks.  

What are security updates?

200

The requirement for more than one piece of information to access an account is called this

What is multi-factor authentication?

200

Reducing or eliminating use of public Wi-Fi is an example of this

What is a security tip (or strategy)?

200

If your computer freezes often, it could be a sign of this

What is a malware attack?

200

Attackers can use your browsing history against you....reduce your risk by using this “mysterious” sounding browser mode when entering sensitive data.  

What is incognito?

300

How often you should shut down your computer so updates can be installed

What is once a week?

300

A Key tracking document is an example of this

What is physical security?

300

One of the ways you can avoid falling victim to an email impersonating someone else.

What is double check the sending address, look for errors/ typos, or call the sender to verify? (other answers may also be acceptable)

300

Instead of just closing the window, be sure to do this when using a website portal with sensitive information.  

What is Log Out?  

400

Lc@RMR6MnMCM&MK$13

What is a strong password?

400

Chocolate chip is a favorite but, for added security, regularly delete these sweet-sounding text files that store your browsing habits.  

What are cookies?  

400

KG needs you to do something for her, right now!

What is CEO fraud/impersonation?

400

Say “no thanks” to these web-form assists designed to make it easier for you to fill out frequently used information.  

What are auto-fills?

500

Encrypting data is an example of this

What is how to protect confidential information

500

Secure websites display a padlock symbol on the left and start with these 5 letters.  

What is https?

500

Sounds like a party for train operators, but this method of cyberattack plays on human emotion and human error.  

What is social engineering?

500

Oops! You forgot to do this first before going on Public Wi-Fi

What is ask "is it worth the risk?"

M
e
n
u