Fraudulent attempt to obtain sensitive information or data, such as usernames, passwords, and credit card details, by disguising oneself as a trustworthy entity in an electronic communication is known as.
What is Phishing
Verify the ___________ that sent you the email, phishing emails may appear to be sent by someone you know.
What is the email address?
How often should you change your password
What is every 3 months
Emails that use a disguise to look like a trusted source is known as
What is are phishing scams
When receiving a Phishing email. What is your first step?
What is to report it and delete it
True or false: It's ok to open attachments or click on links in email messages from unknown senders.
What is False, never open attachments or click links from unknown senders, this can allow viruses on your computer
True or False: Phishing is only done through emails
What is False, scammers also utilize phone calls, SMS texts, and social media sites to trick you into giving up sensitive and confidential information.
If you receive an email and you are unsure about if it is a scam where do you look first?
The senders email address
The term for describing different procedures and techniques for protecting email accounts, content, and communication against unauthorized access, loss, or compromise.
What is email security
This type of phishing that targets specific individuals or organizations in a business.
What is Spear Phishing
Do not _____ on links or attachments from senders that you do not recognize. Be especially wary of .zip or other compressed or executable file types.
What is Click?
True or False: To create a strong password, never use your birthday, hometown, school, university, or brand name
What is True?
True or False: Phishing attacks are designed to appear to come from legitimate companies and individuals.
What is true?
Do not _____ the potential phishing email(s) to anyone.
What is forward?
True or False: You should never have different passwords for each of your accounts
What is False?