Let's Get Physical
Phishing In The Dark
Policies and Standards
Cyber Facts
"ware"
Potpourri
100

Before sending an email containing customer information, what should be typed into the subject line?

Secure

100

The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

Phishing

100

Maintaining a neat work environment during business hours, clearing non-essential documents or documents containing customer information from area as soon as practical.  Documents containing customer and bank proprietary information should be secured in locked drawers, cabinets, or offices.

Clean Desk Policy

100

If using a windows-based PC, you can do this to quickly lock your computer before stepping away.

 Windows+L

100

Monitors user activity on the internet and transmits that information in the background to someone else. 

Spyware

100

A malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security practices, data and computer systems.

Insider Threat

200

Watching (either in person or using a recording device) what you do on your computer by looking at a reflection of or the actual screen of your computer or mobile device.

Shoulder surfing

200

A targeted attempt to steal sensitive information such as account credentials or financial information from a specific victim, often for malicious reasons.

Spear Phishing

200

Policy that defines the appropriate use of Internet/Intranet/Extranet-related systems, including but not limited to computer equipment, software, operating systems, storage media, network accounts, electronic mail, and internet browsing.

Acceptable Use Policy

200

Eight to twelve characters, upper- and lower-case letters, numbers as well as alphabetical characters, easy to remember but hard to guess, never shared with anyone, and never written down and left near your computer.

Secure Password Guidelines

200

A type of malware that holds victims’ computer files hostage by locking access to them or encrypting them. It then demands a ransom if the victim wants his or her files back.

Ransomware

200

A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.  Typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet.

Firewall

300

Most common delivery method of computer viruses and malware

E-mail

300

This is the creation of a false narrative to obtain information or influence behavior.  Could be a phone call, text message, email, etc. designed to steal the victims’ personal information.

Pretexting

300

This document establishes the need for minimum standards for password creation and management used by all employees. This document also outlines enforcement for password policy violations.

Password Policy

300

This kind of software helps to prevent safety threats to your computer like viruses, malware and pop-ups.

Anti-Virus Software

300

A set of instructions or programs that tell a computer what to do or how to perform a task.

Software

300

Accept, avoid, transfer and reduce

Risk mitigation strategies

400

The use of personality, knowledge of human nature and social skills to steal passwords, banking information or other credentials to gain access to systems.   Example:  A phone call stating, "This is Microsoft and we have detected a virus on your computer."  Offering assistance by remotely accessing your computer.

Social Engineering

400

Report it using Phish Alert button, or contact the IT Department, delete the email, do not click on attachments or links

Steps to follow after receiving a phishing email

400

Information security standard for organizations that handle branded credit cards from the major card schemes.

The Payment Card Industry (PCI) Data Security Standard

400

A secure website will always have what letters at the beginning?

HTTPS

400

Software that automatically displays or downloads advertising material (often unwanted) when a user is online.

Adware

400

Carried with you and when not properly password protected can result in a cyber security breach. 

Mobile devices such as laptops, cell phones, tablets

500

Any combination of your name, your home address or phone number, credit card or account numbers or social security number.

Personally Identifiable Information (PII)

500

Type of phishing that directly contacts the target by calling on the phone and mimics known entities to steal sensitive data/funds.

Vishing

500

This policy defines the actions and processes our bank will take to ensure the security and confidentiality of customer and consumer information.  Protect against any anticipated threats or hazards to the security or integrity of the information, unauthorized access to or use of customer or consumer information that could result in substantial harm or inconvenience

Information Security Policy

500

What is the average length of time for a company to discover a cyber security breach?

206 days

500

Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

Malware

500

The term used to describe a computer programmer who tries to gain unauthorized access into a network or computer systems with malicious intent.

Hacker