Potent Passwords
Email
Data Defense
100

This is the most common point of entry for hackers to access business systems.

Employee Email Accounts

100

This type of email attack attempts to steal your credentials by pretending to be a reputable sender.

What is Phishing?

100

This simple command should be used on all your devises to prevent access when unattended

Lock screen settings

200

What is it called when you require a password plus a second verification to login to an account?

Multi-Factor Authentication (or 2-factor authentication)

200

You receive an urgent email requesting to confirm your password or email address to fix an account error. What is this tactic?

What is Social Engineering?
200

You can make using a public wi-fi at the coffee shop or hotel less vulnerable by using this type of connection

VPN, or personal hotspot, or Warp

300

Rather than a single password, what is now considered the best way to create a password?

Use a passphrase, including special characters

300

This is the first thing you should check to verify if an email is from the apparent sender.

The Sender's Email Address or Domain

300

How can you protect the data from your computer being accessed if your computer is stolen?

Hard drive "encrypt at rest" setting

400

What's an easy way to manage multiple strong passwords that are hard to remember? 

Password manager app

400

Before clicking a link in an email, you should do this action to see the true destination URL.

Hover your mouse over the link

400

What is an "inside threat"?

Employees, contractors, past employees, vendors who may pose a security risk