Employee addresses, new product ideas and donation amounts are all examples of this type of information
What is confidential?
A thumb or fingerprint is an example of this
What is biometric MFA?
Examples of this “malicious" software include viruses, worms, ransomware and spyware
What is malware?
Ignoring these can leave your device, applications and software vulnerable to attacks.
What are security updates?
The requirement for more than one piece of information to access an account is called this
What is multi-factor authentication?
Reducing or eliminating use of public Wi-Fi is an example of this
What is a security tip (or strategy)?
If your computer freezes often, it could be a sign of this
What is a malware attack?
Attackers can use your browsing history against you....reduce your risk by using this “mysterious” sounding browser mode when entering sensitive data.
What is incognito?
How often you should shut down your computer so updates can be installed
What is once a week?
A Key tracking document is an example of this
What is physical security?
One of the ways you can avoid falling victim to an email impersonating someone else.
What is double check the sending address, look for errors/ typos, or call the sender to verify? (other answers may also be acceptable)
Instead of just closing the window, be sure to do this when using a website portal with sensitive information.
What is Log Out?
Lc@RMR6MnMCM&MK$13
What is a strong password?
Chocolate chip is a favorite but, for added security, regularly delete these sweet-sounding text files that store your browsing habits.
What are cookies?
KG needs you to do something for her, right now!
What is CEO fraud/impersonation?
Say “no thanks” to these web-form assists designed to make it easier for you to fill out frequently used information.
What are auto-fills?
Encrypting data is an example of this
What is how to protect confidential information
Secure websites display a padlock symbol on the left and start with these 5 letters.
What is https?
Sounds like a party for train operators, but this method of cyberattack plays on human emotion and human error.
What is social engineering?
Oops! You forgot to do this first before going on Public Wi-Fi
What is ask "is it worth the risk?"