Stronger Together
Ransomware
Travel Time
Unapproved Software
Physical Security Controls
100

Where can an employee curious about PowerPlan's InfoSec policies find them?

In Connect.


More specifically HR>Policies, Forms, Procedures>Policies>Information Security Policies

100

In Outlook how may an employee report an email for phishing?

By using the Phish alert feature in the top right of an email.

100

PowerPlan provides this to all personnel. What should you activate on your device at all times when in a public space or when in your hotel?

A VPN.

100

What is unapproved software?

unapproved or possibly unsafe software that can be downloaded.

100

What is all PowerPlan personnel given in order to be able to access the office, and what should you do if you do not have one?

An access badge. If any PowerPlan personnel does not have one they can request one from the Facilities Manager. 

200

What are the two ways an employee can report a security event?

Submit a ticket to internal IT or through Connect using the "Report a Cybersecurity Incident" feature.

200

What is the most common way Ransomware is spread?

Phishing is the most common way Ransomware spreads.

200

When flying, which luggage should your company device be in?

In your carry on baggage. It is important to always keep your device with you at all times.

200

When installing new software, what should you seek before doing so?

Approval. Before installing any new software onto your company device you should obtain approval from your supervisor and/or IT department.

200

What is the device that can be installed using your laptop's security slot to secure it to a fixed object?

A laptop lock.

300

Employee's are bound to leave their work area at some point throughout the day. When an employee does leave their laptop, what is the command to windows lock their screen?

Windows button+L

300

What is Smishing?

Smishing is a form of phishing in which an attacker uses a compelling text message to trick targeted recipients into clicking a link.

300

Protecting your laptop physcially when traveling is also important. What are 2 available options to protect your laptop when traveling?

Use a laptop bag or sleeve to protect your laptop from bumps and scratches when traveling.

300

What should you do if you suspect unapproved software has been installed on a device?

Report it! If possibly malicious software has been installed on another device this may affect you if there is a breach.

300

What do some laptops come with to prevent unauthorized access?


Hint: Look at your hands.

Biometric or fingerprint scanners.

400

What is the term used to describe an attack where a criminal talks an individual into giving up sensitive information?

Hint: Often times the attacker is impersonating someone the individual may know.

Social Engineering.

400

What human element will bad actors often take advantage of in a Phishing/Smishing attack?

Emotions. Attackers may convey a sense of sympathy or urgency in their messages.

400

If your laptop gets lost or stolen how should you report it?

You should immediately report it to authorities and to IT by submitting a ticket to IT@powerplan.com.

400

What should you be aware of when installing new software?

You must be aware of the risks with all applications and software instances that you may download.

400

What is essential to protecting your device and any application account you must have?

All accounts and devices must have a strong password that also meets the PowerPlan password criteria standard.

500

What is the greatest strength but also the greatest vulnerability to our security posture?

Humans. Human error is how most vulnerabilities appear in our environment.

500

Roughly, what is the average cost of a Ransomware attack?

Between 1 and 1.5 million dollars. However, the actual cost can be significantly more.

500

It may not always be possible to keep your device with you at all times. If you have to leave it behind, what are some more secure locations to leave it?

Trunk of your car or in a hotel room. Please do not leave your device in the front or backseat of your vehicle.

500

When your device was issued to you, its settings were setup by our IT department. Which setting must you not ever override when installing a new software?

Please do not override your laptops Security settings to install a new application or software. Chances are that if you have to in order to install something new, it is probably not safe to begin with.

500

What type of device is used to monitor where laptops are stored and can be used to deter theft or provide evidence in a case of theft?

Video surveillance cameras.

M
e
n
u