Let's Get Physical
Phishing In The Dark
Cyber Facts
"ware"
Potpourri
100

Before sending an email containing customer information, what should be typed into the subject line?

Secure

100

The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

Phishing

100

If using a windows-based PC, you can do this to quickly lock your computer before stepping away.

 Windows+L

100

Monitors user activity on the internet and transmits that information in the background to someone else. 

Spyware

100

A malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security practices, data and computer systems.

Insider Threat

200

Watching (either in person or using a recording device) what you do on your computer by looking at a reflection of or the actual screen of your computer or mobile device.

Shoulder surfing

200

A targeted attempt to steal sensitive information such as account credentials or financial information from a specific victim, often for malicious reasons.

Spear Phishing

200

Eight to twelve characters, upper- and lower-case letters, numbers as well as alphabetical characters, easy to remember but hard to guess, never shared with anyone, and never written down and left near your computer.

Secure Password Guidelines

200

A type of malware that holds victims’ computer files hostage by locking access to them or encrypting them. It then demands a ransom if the victim wants his or her files back.

Ransomware

200

A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.  Typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet.

Firewall

300

Most common delivery method of computer viruses and malware

E-mail

300

This is the creation of a false narrative to obtain information or influence behavior.  Could be a phone call, text message, email, etc. designed to steal the victims’ personal information.

Pretexting

300

This kind of software helps to prevent safety threats to your computer like viruses, malware and pop-ups.

Anti-Virus Software

300

A set of instructions or programs that tell a computer what to do or how to perform a task.

Software

300

Accept, avoid, transfer and reduce

Risk mitigation strategies

400

The use of personality, knowledge of human nature and social skills to steal passwords, banking information or other credentials to gain access to systems.   Example:  A phone call stating, "This is Microsoft and we have detected a virus on your computer."  Offering assistance by remotely accessing your computer.

Social Engineering

400

Report it using Phish Alert button, or contact the IT Department, delete the email, do not click on attachments or links

Steps to follow after receiving a phishing email

400

A secure website will always have what letters at the beginning?

HTTPS

400

Software that automatically displays or downloads advertising material (often unwanted) when a user is online.

Adware

400

Carried with you and when not properly password protected can result in a cyber security breach. 

Mobile devices such as laptops, cell phones, tablets

500

Any combination of your name, your home address or phone number, credit card or account numbers or social security number.

Personally Identifiable Information (PII)

500

Type of phishing that directly contacts the target by calling on the phone and mimics known entities to steal sensitive data/funds.

Vishing

500

What is the average length of time for a company to discover a cyber security breach?

206 days

500

Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

Malware

500

The term used to describe a computer programmer who tries to gain unauthorized access into a network or computer systems with malicious intent.

Hacker