The use of personality, knowledge of human nature, and social skills to lower their victim's defenses
What is social engineering?
This platform scans your email for malicious links and bad attachments
What is mimecast?
Having someone's driver's license, full name, date of birth, and social security number is an example of this
What is PII or personally identifiable information?
An example of this would be opening your Outlook to find a message from an outside vendor riddled with spelling errors, asking you to activate your account by clicking a link, and entering your Invenergy credentials
What is phishing or email phishing?
Sweet dreams! This 80s slasher film centered around a monster with knived gloves that would attackyou in your sleep.
What is A Nightmare on Elm Street?
A good one of these will tack hackers over 10,000 years to guess, as long as it's a minimum of 14 characters made up of upper and lowercase letters, numbers, and symbols
What is a password?
This is Invenergy's platform of choice for single sign on (SSO) for all of your apps and multifactor authentication (MFA)
What is Okta?
PII and other types of sensitive information should never be shared using this, as once it's in the receiver's inbox there's always a chance it can be hacked
What is email?
An attack that uses SMS or text messages in an attempt to gain information
What is SMShing?
Hey, you got your chocolate in my peanut butter! According to candystore.com, this candy is the most popular in America.
What is Reese's Peanut Butter Cups?
This is a multi-step account login process that requires users to verify their login attempts with an app or a code (hint: think Okta)
What is MFA or multifactor authentication?
This is Invenergy's Learning Management System, with plenty of trainings for Microsoft applications, IT, and Cybersecurity topics
What is Power Me?
This is a safer alternative to sending information in an Outlook email, and anyone with a Microsoft account can use it
What is OneDrive or File Sharing?
A cyber attack against a specific individual utilizing messaging that appeals specifically to that person
What is spear phishing?
This American horror author's published works include "The Fall of the House of Usher," "The Cask of Amontillado," "The Pit and the Pendulum," and "The Raven"
Who is Edgar Allen Poe?
Not doing this can provide entry points in your tech for attackers, so make sure you accept them when prompted (even if it means you can't use your device for a few minutes)
What is updating or software updates?
This is the weekly article published in the Interconnect for suggestions and best practices for using your technology better
What is Tech Tuesday?
This is a tool used to keep track of varying login credentials across all of your applications or web based accounts
What is a password manager?
An example of this would be receiving a phone call from someone claiming it's the IRS and they need your credit card number to pay the $2000 you owe on back taxes
What is vishing?
All work and no play makes Jack a dull boy. The Shining takes place at the Overlook Hotel in this US state
What is Colorado?
This is the equally important practice of locking up your computer when not in use, not letting anyone enter secure spaces without an ID badge, and keeping your devices safe while travelling
What is physical security?
What is Archibus?
When making a purchase online, make sure the website starts with this 5 letter address marker so you know it's secure, otherwise you may be handing over your credit or debit card information
What is https?
This type of targeted attack goes after executives and other senior management at an organization
What is whaling?
Known for being particularly cruel, Vlad the Impaler of Romania is often credited with being the real life inspiration for this named Halloween monster (though it's unconfirmed if he actually drank blood)
Who is Dracula?