What should be on your person at all times when you are at a PSEG facility?
Your PSEG issued ID badge.
What does the yellow banners in emails indicate?
They are external emails.
Why is it important to classify the data you send?
To protect data and ensure that the person(s) with the right access can view it.
What should you do if you are stepping away from your device?
Lock it
Where can you find our policies and practices?
PSEG Policy Manager
What should you do if you suspect an insider threat?
Always report suspicious activity to corporate security by emailing them at corporate.security@pseg.com and/or calling 1-888-542- 1119
What should you do if you receive a suspicious email and/or a suspicious communication?
Report the email as phishing with the "Report Phish" button and email cybersecurity@pseg.com
This is called ____ which requires that you keep your desk clean from sensitive information.
Clean Desk Policy
Why should you not download unapproved software onto your PSEG device?
It could be malware
This is used to secure and protect data when using internet connection.
VPN
What is it called when an intruder tries to follow you directly into a restricted area?
Tailgating
Threat actors use this phishing method of impersonating someone you trust or an organization you trust to steal sensitive information (BEC).
Business Email Compromise (BEC)
This term refers to the unauthorized access, disclosure, or misuse of data.
data breach
This type of malware encrypts a device’s files and demands payment for their release.
ransomware
What can you do to keep your information safe when using social media?
Make your account private, limit the information you share, or don’t accept friend request from strangers.
When discussing sensitive information in public and using your devices what two things should you look out for?
Eavesdropper and Shoulder Surfer
Name 2 social engineering attack methods threat actors attempt to scam you.
Phishing, Smishing, Vishing, and Quishing
Name any 3 of any of the 4 Data classifications PSEG has.
PSEG Internal, PSEG Confidential, PSEG Restricted, and PSEG Part 810 Export Controlled
What should you do when a PSEG device is lost/stolen?
Notify your manger, IT help desk, Corporate Security, and the police in the jurisdiction where the incident occurred and give them as much information as possible.
What is the name of our cybersecurity page on The Link where you can stay up to date with the best cyber security tips and continue your cybersecurity learning?
Cybersecurity for everyone
What PSEG practice provide guidelines on insider threats?
PSEG Insider Threat Program (Practice 282-21)
What PSEG Practice provides guidelines on Phising?
Defend Against Phishing Program (Practice 282-20)
What PSEG Practice provides guidelines on Classification, Labeling, and Handling?
PSEG Information Security Classification, Labeling, and Handling (Practice 282-5)
What PSEG Practice provides guidelines on Reporting Stolen or Lost Computers and Mobile Communication Devices ?
PSEG Reporting Stolen or Lost Computers and Mobile Communication Devices (Instruction 282-7-1)
What PSEG Practice provides guidelines on Enterprise Computer Protections and Responsibility?
Enterprise Computer Protections and Responsibility Practice (PSEG Practice 282-7)