These Must Be Reported Immediately
Phishing Emails/ Spam
These Grant Access to Computers and are Never Shared
Passwords
These websites and applications provide a platform for users to share content and network in a virtual environment
Social Media
This Action Can Prevent Unauthorized Access to Your Computer Session When You Must Step Away
Locking Your Computer
This is a cyber attack that uses disguised email as a weapon
phishing
How often passwords need to be changed?
Every 3 months
World Wide Web that allows people to communicate.
Social network
When the computer is over heating DO NOT throw ____ to cool it off.
Water
This example of a phishing attack uses an email address that is familiar to the victim, like the one belonging to the organization’s CEO, Human Resources Manager, or the IT support department.
CEO Fraud
A mix of letters (upper and lower case), numbers, and symbols, no ties to your personal information, and no dictionary words.
Strong password
Be careful what you share on the internet because ...
It can never go away
______ will not make your computer run faster.
Physical Harm
Clicking an attachment, Enabling macros in Word document, Responding to a social media connection request, Using a new wi-fi hot spot.
examples of actions in phishing emails
If you must keep track of lots of different passwords, this software can hold your passwords safely so that you don't forget them.
password management software
What is an alien's favorite key on a keyboard?
The space bar
Where did Joey go?
He ransomware