Phishing Types & Terms
Leadership & Best Practices
STAR = Slow Down
MD Anderson Actions & Programs
Threats & Tactics
100

This most common form of phishing uses mass emails impersonating real companies to capture personal info.

What is email phishing?

100

In MD Anderson email, this subject-line tag indicates the message originated outside the network.

What is “[EXTERNAL]”?

100

 In STAR, the “S” reminds you to do this for one second before acting on an email.

What is “Stop”?

100

If you’re uncertain about an email’s legitimacy, this Outlook feature sends it to Cybersecurity for investigation.

What is the “Report a Phish” button?

100

A recent global incident involved this type of previously unknown software flaw exploited against older on‑prem SharePoint servers.

What is a zero‑day vulnerability?

200

When a text message tries to lure you to click a malicious link or share sensitive data, it’s called this.

What is smishing?

200

Leaders are responsible for communicating with employees and taking intentional steps to reduce this specific cybersecurity risk.

What is phishing email click rates?

200

The “T” in STAR stands for this—consider the action you’re about to take; when unsure, call to confirm or use Report a Phish.

What is “Think”?

200

Never provide your user ID or password—and never approve one of these if you didn’t initiate it.

What is a DUO push (MFA approval)?

200

The slide warns of fake verification windows that instruct you to press Windows+R, paste, and hit Enter—this is a form of what?

What is a malicious pop‑up / social engineering trick?

300

A phone call from “IT” asking for your MFA code is a classic example of this voice-based social engineering.

What is vishing?

300

Cybersecurity encourages staff to stay updated by regularly visiting this intranet area that houses the Cybersecurity Awareness Program and campaign information.

What is the Cybersecurity storefront / Cybersecurity intranet page?

300

This element at the top of external emails literally tells you to slow down.

What is the yellow warning banner?

300

Effective Sept. 1, 2025, this program escalates consequences for repeated phishing clicks over a rolling 24‑month period.

What is the Multiple Clicker Escalation Program?

300

Compared to other healthcare orgs, MD Anderson is particularly targeted by corporate credential phishing and this malicious software category.

What is malware?

400

Highly targeted, personalized emails crafted for one person or a small group fall under this term.

What is spear phishing?

400

This FY26 recognition initiative rewards individuals who accurately report phishing attempts, including those sent during MD Anderson campaigns.

What is the CyberSafety eCard program?

400

If you’re unsure about an email and you’re on your phone, the guidance says to wait and review it here instead.

What is on your computer (desktop) rather than mobile?

400

Under that program, a single click does not trigger enforcement, but the workforce member should do this.

What is review cybersecurity policy and tips (and continue training)?

400

One prevention best practice in the deck: don’t click links or open attachments when using this device type.

What is a mobile device (phone/tablet)?

500

An attacker impersonates a senior leader to request urgent payments or data. Name this attack category.

What is Business Email Compromise (BEC)?

500

Part of leadership responsibility is fostering a culture where employees demonstrate personal responsibility, accountability, and knowledge sharing to protect the institution. What is this broader concept called in the slides?

What is cybersecurity awareness and professionalism (or a cybersecurity‑aware culture)?

500

STAR aligns with this institutional reliability approach and skill set emphasized on the slide.

What is our HRO approach / Universal Skills for Reliability—paying attention to detail?

500

Name one possible higher‑tier consequence from the Multiple Clicker Escalation Program (e.g., performance rating impact, in‑person training, financial penalty, or risk of termination). 

What is: “Needs Improvement” rating(s), in‑person training/discussion, documented corrective action, financial penalty, or risk of termination?

500

The deck highlights a campaign where Incident Command was activated and the cybersecurity threat level was escalated after this Microsoft product was breached.

What is Microsoft SharePoint (older on‑prem versions)?