This is the current version of the Department of Defense’s cybersecurity standard that tkMNA must comply with.
What is CMMC 2.0?
TISAX stands for this full name.
What is Trusted Information Security Assessment Exchange
These AI-generated videos or audio clips are designed to impersonate real people, often used in misinformation or fraud schemes.
What are deepfakes?
This form of malware encrypts your files and demands payment for their release.
What is Ransomware?
This type of software helps detect, block, and remove malicious programs from your device.
What is antivirus?
This kind of training, required by all CMMC levels, helps employees recognize threats like phishing and social engineering.
What is Security Awareness Training?
TISAX labels are valid for this many years.
What is 3 years?
An attacker could pose as a colleague or company executive on LinkedIn and send a seemingly legitimate and genuine message requesting sensitive company information.
What is Social Engineering?
This term refers to unauthorized attempts to access or compromise systems and data.
What is hacking?
This Microsoft mobile app supports MFA by generating one-time codes or allowing quick tap-to-approve logins.
What is Microsoft Authenticator?
tkMNA needs what level of CMMC for secure handling of Controlled Unclassified Information.
What is Level 2?
This is the first step a company must take to begin the TISAX process.
What is registering as a participant with the ENX Association?
This term refers to the process of transforming readable data into an unreadable format to protect its confidentiality.
What is encryption?
This type of attack involves emails that appear to come from trusted sources to trick recipients into taking harmful actions.
What is phishing?
This secure file-sharing tool allows encrypted email and large file transfer without requiring accounts or installed software.
What is Cryptshare?
This practice, required at CMMC Level 2, ensures users only have access to the data and systems they need for their job.
What is the principle of least privilege?
TISAX primarily applies to suppliers in this industry.
What is the Automotive Industry?
Before leaving your desk, you should always do this to prevent others from accessing your computer.
What is lock your screen?
A common sign of a phishing email is this clickable element that leads to a fake or dangerous website.
What is Malicious Link?
This Zscaler endpoint tool connects users to internal apps and the internet securely, without a traditional VPN.
What is ZIA?
Unlike previous versions of CMMC, the newly published program allows for what type of assessment between the 3yr recertification?
What is annual self-assessment?
Leaving sensitive documents on your desk overnight violates this standard TISAX rule.
What is the clean desk policy?
these official documents are corporate guidelines and requirements to help protect Thyssenkrupp data and systems.
What is MX Group Operating Instructions (GOI) MX Operating Instructions (OI)
If you spot suspicious activity—like unknown apps or strange network traffic—this is your first course of action.
What is report it.
This Trellix solution enforces encryption policies on USBs and portable devices to prevent data loss or theft.
What is Trellix File and Removable Media Protection (FRP)?