Always be looking for ________ messages when checking email.
What is phishing?
The most popular operating systems for laptops.
What is Microsoft Windows?
Minimum character recommendation for your passwords.
What is 16 characters?
Still the most popular social media service in the world.
What is Facebook?
The INL phone number to call with cybersecurity questions.
What is (208) 526-1000, or 6-1000?
A good method to check if a suspicious message from a co-worker is legitimate.
What is call them or contact them via another communication method or check with AskCyber?
This physical part of your laptop should be covered when not in use- just in case someone is watching.
What is the webcam?
What to do if you recognize a message you just received is phishing.
What is report it?
This kind of engineering isn’t about building bridges- it's about manipulating people.
What is social engineering?
The INL group that handles computer support calls.
What is the Service Desk?
Scammers ask for payment via one of these methods because they are very difficult to trace and recover. (name any one)
What are payment apps, gift cards, cryptocurrency or wire transfers?
This is used to create a secure connection over a less secure network, often used in remote work scenarios.
What is a VPN (Virtual Private Network)?
You should do this before using a USB drive someone found “just lying around” at an INL facility or parking lot.
What is turn it in or report it?
These social media settings should be set to your comfort level and checked regularly, like at least once a year.
What are privacy settings?
The name of INL's VPN and network security tool.
What is Zscaler?
The first action to take if you accidentally click on a real phishing email at INL.
What is immediately call the Service Desk?
Always keep software ________ on any device connected to a network or the internet.
What is “updated”?
The name of the password management software approved for use on INL computers.
What is KeePass or the Mac Keychain or Mac Passwords app?
This type of phishing attack targets specific individuals or organizations with personalized messages.
What is spear phishing?
The second most popular social media service in the world.
What is Youtube?
The best way to use your phone for Multi-Factor Authentication method
What is use an authenticator app?
The group name for devices like smart doorbells, smart cameras, and smart TV's.
What is "Internet of Things" (IOT)?
This AI tool is the most recent application to be prohibited from U.S. Government computers.
What is DeepSeek?
The main reason most social media services are free.
What is so they can collect information about you for advertising?
The cybersecurity concept that says never trust any device or person on a network (unless you regularly verify them)
What is Zero Trust?