This is the only Information Sensitivity Classification that includes PII.
What is Restricted?
Person you can share your password with.
What is no one?
This form of fraud occurs when an employee uses their position at SYF for personal enrichment
What is internal fraud?
Technique to check if a displayed email address is legitimate.
What is hover over the display name to check that the email matches the name?
Think before you click, keep your operating system up to date, use anti-virus software
What are best practices to avoid malware?
Time period to wait to report an incident or lost/stolen device.
What is none? Always report immediately!
Allowing others to gain entrance to a secure location or restricted zone without using their own badge, access card, or key card.
What is tailgating or piggy-backing?
These data types need to be encrypted when stored and transferred.
What are Restricted and Confidential?
Minimum number of characters for a password at Synchrony.
What is 8?
Art of manipulating people into performing certain actions or divulging confidential or sensitive information.
What is social engineering?
Found in the Outlook toolbar and used to report a suspicious email.
What is Report Phishing button?
Any software program that seeks to do harm or steal information.
What is malware?
Number of hours per day the JSOC (India or US) is monitored.
What is 24?
These are used to dispose of sensitive printed documents.
What is secure destruction bin or shredder?
This should never be shared on web-ex or jabber.
What is sensitive information?
This is the frequency that passwords expire and must be changed at Synchrony.
What is 90-days?
Safeguard personal information, routinely monitor personal accounts, and report suspicious activity immediately.
What are key actions or best practices to protect yourself from fraud?
These two terms refer to phishing by voice or over text message [two terms]
What are vishing and SMShing?
Most common type of malware.
What is virus?
Email to contact the Joint Security Operation Center.
What are JSOC@syf.com or cybersecurity@syf.com?
The act of a person watching what you do on your computer by looking at your mobile device or computer screen or a reflection of your actual screen.
What is shoulder surfing?
Synchrony's most secure and preferred method of continual bulk data transfers.
What is Gentran?
Using a story to create a strong password that is easy to remember.
What is a passphrase?
Types of personal information criminals are trying to steal.
What are Credit card numbers, social security numbers, bank account information or passwords?
Email address for reporting a suspicious email.
What is Phish@syf.com?
Number 1 delivery means for malware.
What is email?
This information should NOT be included in an incident report.
What are PII, passwords, sensitive information, customer-related inquiries, life-threatening/emergency issues?
Visitors to SYF sites need a(n) ____ with them at all times.
What is an escort?
___ is used when sensitive data is sent externally via email;
___ is used when sensitive data is sent internally via email.
What are Outlook Encrypted Email solution (Send Securely button) and PKZIP (with AES 256 bit encryption)?
Percent of data breaches due to stolen passwords.
What is 81? (Accept 70 to 90)
Actions such as: call ins asking SYF employees for procedural information over the phone, Callers asking for customer information, Callers rushing employees to skip verification procedures, Callers wanting to forgo authentication.
What are actions or red flags of social engineering?
By the end of 2017, the average user was receiving an average of # malicious emails per month according to Symantec's 2018 Internet Security Threat Report.
What is 16? (accept 10-20)
Country with the most reported computer infections from virus attacks.
What is China?
National campaign from the Department of Homeland Security that relies upon our shared and individual responsibility to report suspicious activity related to physical and information security.
What is "See Something, Say Something?"
Should be done whenever you leave your computer.
What is log-off or lock your computer?