Physical Security
Social Engineering
Data Handling & Classification
Device Safety
Cyber Best Practices
100

What should be on your person at all times when you are at a PSEG facility?

Your PSEG issued ID badge.

100

What does the yellow banners in emails indicate?

They are external emails.


100

Why is it important to classify the data you send?

To protect data and ensure that the person(s) with the right access can view it.

100

What should you do if you are stepping away from your device?

Lock it

100

Where can you find our policies and practices?

PSEG Policy Manager

200

What should you do if you suspect an insider threat?

Always report suspicious activity to corporate security by emailing them at corporate.security@pseg.com and/or calling 1-888-542- 1119


200

What should you do if you receive a suspicious email and/or a suspicious communication?


Report the email as phishing with the "Report Phish" button and email cybersecurity@pseg.com                                          

200

This is called ____ which requires that you keep your desk clean from sensitive information.

Clean Desk Policy

200

Why should you not download unapproved software onto your PSEG device?

It could be malware

200

This is used to secure and protect data when using internet connection.

VPN

300

What is it called when an intruder tries to follow you directly into a restricted area?

Tailgating

300

Threat actors use this phishing method of impersonating someone you trust or an organization you trust to steal sensitive information (BEC).

Business Email Compromise (BEC)

300

This term refers to the unauthorized access, disclosure, or misuse of data.

data breach

300

This type of malware encrypts a device’s files and demands payment for their release.

ransomware

300

What can you do to keep your information safe when using social media?

Make your account private, limit the information you share, or don’t accept friend request from strangers.

400

When discussing sensitive information in public and using your devices what two things should you look out for?

Eavesdropper and Shoulder Surfer

400

Name 2 social engineering attack methods threat actors attempt to scam you.

Phishing, Smishing, Vishing, and Quishing

400

Name any 3 of any of the 4 Data classifications PSEG has.

PSEG Internal, PSEG Confidential, PSEG Restricted, and PSEG Part 810 Export Controlled

400

What should you do when a PSEG device is lost/stolen?

Notify your manger, IT help desk, Corporate Security, and the police in the jurisdiction where the incident occurred and give them as much information as possible.

400

What is the name of our cybersecurity page on The Link where you can stay up to date with the best cyber security tips and continue your cybersecurity learning?

Cybersecurity for everyone

500

What PSEG practice provide guidelines on insider threats?

PSEG Insider Threat Program (Practice 282-21)

500

What PSEG Practice provides guidelines on Phising?

Defend Against Phishing Program (Practice 282-20)

500

What PSEG Practice provides guidelines on Classification, Labeling, and Handling?

PSEG Information Security Classification, Labeling, and Handling (Practice 282-5)

500

What PSEG Practice provides guidelines on Reporting Stolen or Lost Computers and Mobile Communication Devices ?

PSEG Reporting Stolen or Lost Computers and Mobile Communication Devices (Instruction 282-7-1)

500

What PSEG Practice provides guidelines on Enterprise Computer Protections and Responsibility?

Enterprise Computer Protections and Responsibility Practice (PSEG Practice 282-7)