Cybersecurity Basics
Phishing
IT Policies
Security in the workplace
100

This term is used for 2 or more forms of identification to login securely.

What is Multi-Factor Authentication (MFA)

100

This is the type of phishing called when you receive a text message.

What is Smishing

100

This is the best practice for reporting cybersecurity related events.

What is submitting a helpdesk ticket 

100

This is the first step before leaving your computer unattended.

What is lock it

200

This is a fraudulent practice of sending emails or other messages purporting to be from a reputable/known source.

What is Phishing

200

This should be done prior to clicking on any link in an email.

what is hover over and view the URL

200

This should never be reused.

what is password?

200

What should you do if you find a USB drive laying on the ground?

What is report it and don't plug it in

300

This secret is only known by you and should never be shared with others.

What is a password 

300

This is the most common way hackers get into a companies network.

What is Social Engineering / Phishing

300

Associates need to do this before going on vacation abroad and wanting access to work systems.

What is submit a helpdesk ticket

300

This is the proper way to dispose of sensitive documents in the workplace?

What is shred it

400

This platform is used for Cybersecurity Awareness Training.

What is KnowBe4

400

These are the 4 most common signs of a phishing email.

What is urgency, suspicious sender/domain, unsolicited attachments/links, and spelling mistakes

400

This is added to the top of emails if originating externally.

What is a banner

400

It is important to update the software on your computer to protect against this.

What is known vulnerabilities

M
e
n
u