Should be at least 16 characters long
What is a password?
Commonly abbreviated as VPN.
What is a Virtual Private Network?
When someone sends you an email message trying to convince you to login to a malicious website, click a malicious link or attachment, or send money to malicious actor.
What is phishing?
The cybersecurity name for software designed to do malicious things. It's a combination (or mashup) of two different words.
What is malware?
You should keep the _______ on your computers and other devices updated.
What is software?
A method of access control where users present multiple, separate pieces of identification, such as a password and keycard, in order to access a system, aka MFA
What is Multi-Factor Authentication?
A wireless network made available to customers of businesses for free. Generally, it should be avoided.
What is public WiFi?
When someone pretends to be falling in love with someone else on social media to steal money or information.
What is a romance scam or catfishing?
A software program designed to capture everything you type while you are using your computer.
What is a keystroke or key logger?
This is used as a second authentication factor when INL employees login to their computers or accounts.
What is a smartcard, CAC card or badge?
Methods of authentication using something you are, like a fingerprint.
What is biometrics?
The most important device to keep secure on your home network?
What is the router?
The cybersecurity word for sending malicious messages via text instead of email. It's a combination (or mashup) of two different words.
What is smishing?
Software which encrypts information on a computer or computers until the victims pay to have it decrypted.
What is ransomware?
A collective name for devices that formerly did not have internet connections but now do, aka IoT.
What is Internet of Things?
Adding this is the easiest way to make a password stronger.
What is length?
When this is at the beginning of a web address, it means the information entered into the site is encrypted.
What is HTTPS?
Impersonating executives, employees, or business partners to trick staff into transferring funds or sensitive information to criminals, aka BEC.
What is Business Email Compromise?
A malicious program designed to look legitimate which actually allows an attacker to take actions on the compromised device, aka RAT.
What is a Remote Access Trojan?
A large collection of computers which have been taken over by a cybercriminal to send out attacks or to overwhelm web pages.
What is a botnet or zombie horde?
An authentication method which allows you to sign in to your work computer, but provides access to third-party applications or services without having to login again, aka SSO.
What is Single Sign-On?
The name of the service which provides both VPN services and a Zero-Trust network environment for INL.
What is Zscaler?
A scam where the initial message is innocuous to develop trust, but the second message is malicious.
What is a double-barrel scam or double-barrel phishing?
This type of malicious software has been sold by legitimate companies and nations to track employees, journalists, and outspoken opponents of governments.
What is Spyware?
Over the last year, malware on this operating system has gone up by 165%
What is MacOS?