Phishing & Social Engineering
Passwords & Authentication
Data Protection & Finance
Cyber Hygiene & Best Practices
Incidents & Threats
100

What is the most common red flag in a phishing email?

Unexpected sender, suspicious links, or urgent language.

100

 True or False: You should use the same password for work and personal accounts.

False

100

What type of information is considered PII (Personally Identifiable Information)?

Name, Social Security Number, address, account number, or anything that identifies an individual.

100

Why is locking your computer when you step away important?

To prevent unauthorized access to systems or sensitive information.

100

Who should you contact first if you think your computer has been hacked?

The IT/security team immediately.

200

If you receive a suspicious email that looks like it’s from IT, what’s the first action you should take?

Report it using the phishing report button or forward to IT/security — do not click or reply.

200

What is MFA and why is it important for FMFC?

Multi-Factor Authentication; it adds an extra layer of security beyond passwords to protect accounts and transactions.

200

What is the safest way to send sensitive customer documents, such as tax returns or bank statements, to a client?

By using secure, encrypted email or an approved secure file transfer system — never regular email.

200

What should you do before connecting a USB drive to your work computer?

Ensure it’s approved and scanned by IT/security — avoid unknown or personal drives.

200

What is ransomware and how does it impact financial institutions?

Malware that encrypts files and demands payment, potentially halting operations and risking data loss.

300

What’s the term for an attacker pretending to be a CEO or manager to trick staff into sending money or data?

Business Email Compromise (BEC) or CEO Fraud.

300

How often should you change your password if you suspect it’s been compromised?

Immediately.

300

Why is encrypting emails with sensitive data critical in finance?

It prevents unauthorized access to customer financial information in transit.

300

Why should you never install unauthorized software on your work laptop?

It could introduce malware or violate security policies.

300

What does the term “zero-day vulnerability” mean?

 A security flaw unknown to the vendor, with no patch available yet.

400

Why should you never click on links in an unsolicited email, even if it looks legitimate?

They could lead to fake websites or malware downloads.

400

What makes a password strong — length, complexity, or both?

Both — at least 12+ characters, mixing letters, numbers, and symbols.

400

What should you do if you accidentally send client financial info to the wrong recipient?

Report immediately to IT/security and management — do not try to “fix it” quietly.

400

What is patching and why does it matter for cybersecurity?

Updating software to fix vulnerabilities that attackers could exploit.

400

Why is reporting a suspected phishing email — even if you didn’t click — important?

 It helps IT block the threat and protect others from falling victim.

500

What is “spear phishing” and how does it differ from regular phishing?

Spear phishing is highly targeted at specific individuals using personal details, while regular phishing is broad and generic.

500

Why are password managers safer than writing down your passwords?

They securely store and generate unique, complex passwords without exposing them on paper or sticky notes.

500

What is DLP (Data Loss Prevention) and how does it protect financial institutions?

A technology that monitors and prevents unauthorized sharing or transfer of sensitive data.

500

What’s the safest way to use public Wi-Fi when accessing work systems?
 

Use a VPN (Virtual Private Network) to encrypt your connection.

500

What’s the difference between a vulnerability and a threat?

A vulnerability is a weakness in a system; a threat is something that can exploit that weakness.