Suspicious Packages
Suspicious Person
Security
Computer Safety
GLO
100

If a suspicious package is found, what are 3 things you should NOT do?

Do not open or shake it. 

Do not carry to show others. 

Do not sniff, touch or taste.


100

What is suspicious behavior?

Is any observed behavior that could indicate terrorism or terrorism-related crime

100

What is Safety and Security non-emergency number?

4357

100
What are some online threats?

Hackers

Malware

Botnets

Phishing emails

100
What is the corresponding smoking area for Employees?

Employee pick up/drop off area

200

What are 4 things you look for, to recognize a suspicious letter/package?

Handwritten or poorly typed address.

Strange odors and sounds. 

Excessive tape or string. 

Fluids or wires coming out of it.

200

Can a person questioning individuals at a level beyond curiosity about a building’s purpose, operations, security procedures and/or personnel, shift changes, etc. be considered Suspicious activity/person?

Yes

200

What is Safety and Security emergency number?

88

200

What should you do, if you receive a scam email at work?

Do not open it; report it as phishing email.

200

Who is responsible for cleaning up bios?

Housekeeping team

300

Who should you notify if a suspicious package is found?

Security

300

How do you report suspicious activity?

Describe specifically what you observed, including:

  • Who or what you saw;
  • When you saw it;
  • Where it occurred; and
  • Why it's suspicious.
300

During an emergency you should evacuate the building by using ____________?

Exit Signs

300

What is the normal password length recommended and what should they contain?

Passwords that contain at least 8 characters with a combination of letters, numbers and symbols.  Strong passwords are less likely to be hacked than very generic passwords.

300

If a visitor is found in the Heart of house, without any credentials. Where should you escort him/her, to obtain one?

Safety and Security window

400

Can you receive Suspicious packages/envelope at home?

Yes, suspicious packages may be delivered at home or at the Workplace.

400

An individual passing through the lobby, taking pictures of cameras, the Front Desk, taking notes and counting paces; sketching floor plans, etc. can be considered Suspicious activity?

Yes

400

If you see a suspicious person not wearing uniform and no credentials, what should you do?

Approach the individual and ask if they have an ID, Name Tag or visitors pass.

If not fully comfortable with approaching him/her, note the description of the person and the location they were heading to and Contact Safety and Security.

400

When leaving your computer unattended, what must you do?

Physically lock it to prevent theft of the machine.  

We also suggest that users lock the screen with a password to safeguard data.

400

What is the difference between Safety and Security?

Safety - the condition of being protected from or unlikely to cause danger, risk, or injury.


Security - the quality or state of being secure from any danger.

.

500

What is security?

The state of being free from danger or threat.

500

Who should you call if you suspect of suspicious activity?

Safety and Security

500

What should all employees, partners and Contractors be wearing in the Heart of house?

Credentials (Name tag, ID, or visitors pass). 

Uniform only is not acceptable and all credentials must be visible at all times.

500

What information should you limit yourself from sharing in online?

Birth dates, anniversaries, addresses, phone numbers.


Protect yourself from identity theft and other scams by limiting what information you disclose online and who can see that information.

500

Can you name, all of the Security chain of command?

Mike Vazquez - Director

Adilson Barros - Assistant Director

Sarah Norris - Manager 

JC De Leon, Krisia Lopez, Angela Kantner & Jose Crespo - Supervisors

M
e
n
u