Sending and
Receiving
Protecting
Our Data
Out of
Office
Don't Get
Scammed
Connecting
In
100

Email mis-delivery is an easy, common mistake to make. It's a best practice to do this before you send sensitive information.

What is always double-check email addresses?

100

You receive a notification from IT that your company was breached. IT asks you to report anything suspicious that might happen. The next morning when you try to log in, it says that your account is locked due to too many login requests. You should do this.

What is report this to IT?

100

You're working from home for a few days and you get an email to your personal account on your work computer - you don't recognize it, but the title looks like it might be funny. Your office doesn't like you opening unknown emails. If it has anything suspect, like a keystroke logger, hackers could track everything that you're typing, gaining access to your work login credentials in addition to your personal information. This is the best way to go.

What is to delete it?

100

If a random person calls you and has a few details about you, it doesn't necessarily mean that the call is legitimate. Scammers can use social media to research their victims. You're always careful and verify any strange calls you get without doing this.

What is providing sensitive data over the phone?

100

You're reading the news and see that there was a huge data breach for a site that you use. It put thousands of emails at risk. Your work email might have been compromised, too; you decide to update and vary your login credentials for everything associated with the email to minimize any issues. Doing this for multiple accounts puts all of your accounts at risk.

What is using the same login?

200

You have a file to send to an important client. The system that you're using has a default naming system, but you make sure to do this, so that you significantly lessen the chance of accidentally grabbing the wrong file when sending it to the customer.

What is rename the file with specific information?

200

HIPAA guidelines stipulate that all of this be encrypted at the hardware level; as this helps make sure that any hard drives that are not disposed of properly cannot be used to access the data.

What is protected health information?

200

You've heard about the risks that come with charging your cell phone or other portable devices with 3rd party charging stations. Just to be safe, you do this for your devices whenever you're traveling. It's safer to know and control exactly where your device is plugged in.

What is make sure to carry a wall charger?

200

You receive a call that your account has been sent to debt collection. The only way to correct the issue is to provide some personal information. You're concerned, so you get this and you hang up. You Google their name and it is non-existent. You decide not to call back as it doesn't look like a legitimate operation.

What is the name and phone number of the collection agency?

200

In an effort to make hackers' software not able to crack your credentials, it is a good idea to choose passphrases instead of passwords, relating them to the site they are used for. You create a different passphrase for each site. You can replace letters in your passphrase with numbers and symbols like replacing an "I" with a "1" or an "A" with an "@." This adds complexity to the passphrase without doing this.

What is making it difficult to remember?

300

If you are unable to encrypt a patient's medical information when you need to send it to a colleague, it is necessary to do this, so that no PII is being sent or received.

What is minimize the data as much as possible?

300

Your old laptop had access to sensitive information, and no longer works; but it is not safe to just throw out without doing this.

What is wiping or removing the hard drive?

300

While using a rideshare service, you see a charging cord for your device. Instead of using theirs, you do this; as it's better to be safe and make sure that your information isn't compromised.

What is pull out your own charger and ask that they plug it into their A/C adapter?

300

You receive an email asking you to login and check your messages for a popular site, but first you look over it carefully. The formatting looks right, but the domain is misspelled. You can check messages directly, so you decide not to do this in a strange email with inconsistent details. You then follow your company protocol for what to do with suspicious emails.

What is risk clicking anything?

300

For added security, you can enable this on many sites that will require both a password and something in your possession {like a phone} to log in, making it that much tougher for someone to gain unauthorized access to your accounts.

What is 2-Factor Authentication?

400

After sending several emails, you realize that the last two addresses had very similar beginnings and you mistakenly sent an email to the wrong recipient thanks to auto-complete. You quickly follow your company's policy to do this. Your reputation is at stake, so you want to make sure that you've done all that you can to correct the situation.

What is report potentially leaked information and notify both parties?

400

Your co-worker sends you a message on your day off asking for your password so that he could finish a project. You have additional access to confidential data, though, and giving up your credentials, even to a co-worker, is not a secure thing to do. You let your co-worker know that he should do this.

What is reach out to a supervisor for help?

400

You're happy to make new friends on your social media accounts, but making your personal details, like email, location, or life events, open to the public is risky and you want to make sure that you control this. Hackers could easily find those details and use them against you, your employer, or your family. Paying attention to privacy and what you share is very important.

What is who sees what about you?

400

An email has come from a supervisor or physician, and although it came directly from them; there is a way for hackers to do this.

What is mimic an email address?

400

loT devices are any device that connects to the internet including printers, game consoles, webcams, automobiles, and DVRs. Your loT devices, along with many others, can be used to bring down the internet and cause trouble both at home and at work. When setting any loT device up, you should always do this.

What is change the default username and password

M
e
n
u