This is big business and includes phishing, ransomware and identity theft.
What is Cybercrime?
This is an example of Malware
What is Ransomware, Virus, Trojan, Worm?
In the context of security awareness, this is a red flag.
What are areas you should check to see if something is legit or not.
This is what you should do when you receive a suspicious email requesting you to update your account information
example: Amazon, Paypal
What is Open web browser and log into service and update account information?
or
What is Contact IT!
Don't click links in emails to update credentials, when in doubt go directly to that service to update credentials, ask IT if unsure.
This gentlemen was featured in our Knowbe4 training
Who is Kevin Mitnick?
This is the easiest way to let an attacker into a network.
you/me
This is a favorite trick that hackers like to use
What is creating a sense of urgency or confusion that gets you to act without thinking through?
This is 1 red flag location on a suspicious email
What is the From:, To:, CC:, Subject Line:, Date:, Attachment, Body of Email,
This is what you should you do if you get a call from somebody that is unexpected, and they are asking for information from you or need you to do something for them.
What is verify who they are, ask for more information like a contact person or account number.
Another good way is to ask for a call back number in case you get disconnected.
This is how we use USB drives in the board room.
These are the methods used by cybercriminals to breach your device and get into your network.
What is the Threat Landscape?
These are the three things you should do before you click on any link, attachment or email.
What is Stop, Look and Think.
Always follow this rule "If you didn't ask for it, don't open it"
This is what you can do on your own to see if a link in an email legit.
What is hover over the link to compare the address?
This is what you should do if you receive an email that you are expecting but it's not legit.
What is check the RED FLAGS! check all of the red flag areas. Phish Alert button.
This is the name of the Anti-Virus software that scans all of our computers for malware.
What is Trend Micro?
These are examples of Social engineering, which is the art of manipulating, influencing, or deceiving you in order to take some action that isn't in your own best interest or in the best interest of the organization.
What is Phishing, Spear Phishing, Plugging in an infected USB device, Social Media.
Social media can be a wonderful source of valuable information for hackers.
This is how malicious software is installed on mobile devices such as smart phones and tablets
What is a SMS/TEXT with malicious links?
These are 5 red flags in a suspicious email
What are TO:, From:, CC;, Body of Email, Date, Attachment, Subject Line
This is Spear Phishing
(Actually it's Maverick and Goose)
What is a targeted attack on a specific individual to gain access to a system or to steal data?
This is the email firewall that filters out spam and other harmful emails
What is Proofpoint?
This file type is the only safe one to click on when receiving it in an email.
What is Text document or .TXT
These are at least 2 functions an attacker can gain access to when malicious software has been installed
What is Access to files/network, Access to webcam, Access to microphone, Record audio from phone microphone, Pinpoint GPS location.
This is how you would verify if a mobile app asked you to update their app through a text message.
What is Check app store to see if there is an app update?
Never update through SMS requests!
This is referred to Whaling
What is a specific type of spear phishing aimed at VIPs of the organization?
What is never give access to outside people to internal network resources?
or
What is a thumb drive should be used instead?