What is ransomware?
Malware that encrypts data for ransom
What is a cloud service?
Online platform for data storage and access
What is an insider threat?
Risk from someone within the organization
What is a risk of installing unknown apps?
Malware infection
What is shadow IT?
Use of unauthorized tech or apps
What is a Trojan?
Malware disguised as legitimate software
What is a risk of using public cloud services?
Unwanted data exposure
What is a sign of insider threat behavior?
Accessing data outside job scope, Bypassing security controls, Downloading large volumes of data, Using unauthorized devices, Unusual login times
What should you do before connecting to public Wi-Fi?
Answers may include dont connect to public Wi-Fi, or use a VPN
Why is shadow IT risky?
It bypasses security controls
What is the best defense against malware?
Regular updates and antivirus software
What is multi-factor authentication?
Using two or more verification methods
What helps detect insider threats?
Monitoring and access controls
What is a secure way to unlock your phone?
Biometric authentication, 6-digit password/PIN
What is a common example of shadow IT?
Using personal cloud storage for work, unlicensed software, unapproved messaging apps
What is a sign of malware infection?
Slow performance, Unexpected behavior, Frequent crashes, Unusual pop-ups, Unauthorized access attempts
What is a secure way to share files in the cloud?
Use encrypted and access-controlled links
What should you do if you suspect insider misuse?
Report to security or HR
What is a mobile device management (MDM) tool?
Software to secure and manage mobile devices
How can organizations reduce shadow IT?
Provide approved tools and training
What should you do if you suspect malware?
Disconnect and report to IT
What should you confirm before sharing sensitive data via a cloud platform?
That the platform uses encryption, access controls, and complies with relevant data protection regulations
What is a preventive measure against insider threats?
Answers may include least privilege access, DLP tools, background checks, and security reviews
What should you do if your phone is lost?
Report and remotely wipe data if no authenticator is used
What should you do if you discover shadow IT?
Report it to IT or security