You begin to witness random ads popping up; your computer starts running slowly; or you are unable to connect to desired locations.
What is being HACKED?
The Lab is constantly scanning for vulnerabilities to correct them as soon as possible. Do this when you receive notifications about vulnerabilities.
What is APPLY PATCHES?
APPLY UPDATES?
This behaviour will help to safeguard you and your computer from links in random emails.
What is BE SUSPICIOUS?
REFRAIN FROM CLICKING?
REPORT SUSPICIOUS EMAIL?
The list of authorized software that is available for through the planned purchase process.
What is APPROVED SOFTWARE?
Consider this type of information before sending a file to be printed.
What is SENSITIVE INFORMATION?
The best practice to avoid the risk of hackers using email to entice users to click a link or respond to them?
What is FOLLOW PROCESSES?
REPEATABLE PROCESSES?
BUSINESS PROCESSES?
Failure to include these can make attacks easier for hackers and make investigation harder for Lab personnel.
What are SECURITY CONTROLS?
While cruising through your emails you get a popup message that states: your computer has been exposed to ransomware. What is the best option to ensure your computer is secured?
What is DISCONNECT from the network.
This required action helps ensure to ensure security of information stored on a device and that it is placed in the right security zone.
What is REGISTERING A DEVICE?
DEVICE MANAGER?
This allows for more secure printing by requiring you to tap your badge on a reader before printing.
What is PUBPRINTING (Print Using Badge)?
Hackers routinely plant this with the intent to cause havoc.
What is MALWARE?
This activity scans for default passwords, vulnerabilities, and misconfigurations on production systems in order to expose those problems before hackers find them.
What is PENETRATION TESTING?
You think you are being targeted by an attacker via email or supicious links. What should you do?
What is CONTACT SUPERVISOR?
CONTACT CYBERSECURITY?
CONTACT MY DCSO?
REPORT PHISHING BUTTON?
Using this type of software creates a risk to the Lab because it has not been vetted by the Lab to ensure its safety.
What is FREE SOFTWARE?
What is the recommended practice for managing multiple passwords?
What is PASSWORD MANAGER?
Hackers want to do this to websites in order to steer you to other bad sites for their malicious purposes.
What is HIJACKING?
When creating passwords at the Lab use this tool as your guidance on length, complexity and uniqueness.
What is SBMS?
A good practice to ensure vulnerabilities or misconfigurations are found and addressed before being exploited.
What is SCAN THE WEBSITE?
What makes computer investigations harder and can indicate that you have done bad things on the computer?
What is SHARING CREDENTIALS?
When using tools on an external website, what should you do to ensure your online safety?
What is UNIQUE USERNAME?
UNIQUE PASSWORD?
UNIQUE CREDENTIALS?
These are good for initial setup of devices but should be changed before launching a system in production.
What are DEFAULT PASSWORDS?
This helps you find the tools needed for quick reports or other application needs.
What is the SOFTWARE STORE?
System Administrators use these to record actions by users on their server.
What are LOGGING MECHANISMS?
A cybersecurity risk that originates from within an organization.
What is an INSIDER THREAT?
This is used with public facing tools to ensure that they are controlled to prevent unwanted cyber events.
What are CREDENTIALS?