This is the most common point of entry for hackers to access business systems.
Employee Email Accounts
This type of email attack attempts to steal your credentials by pretending to be a reputable sender.
What is Phishing?
This simple command should be used on all your devises to prevent access when unattended
Lock screen settings
What is it called when you require a password plus a second verification to login to an account?
Multi-Factor Authentication (or 2-factor authentication)
You receive an urgent email requesting to confirm your password or email address to fix an account error. What is this tactic?
You can make using a public wi-fi at the coffee shop or hotel less vulnerable by using this type of connection
VPN, or personal hotspot, or Warp
Rather than a single password, what is now considered the best way to create a password?
Use a passphrase, including special characters
This is the first thing you should check to verify if an email is from the apparent sender.
The Sender's Email Address or Domain
How can you protect the data from your computer being accessed if your computer is stolen?
Hard drive "encrypt at rest" setting
What's an easy way to manage multiple strong passwords that are hard to remember?
Password manager app
Before clicking a link in an email, you should do this action to see the true destination URL.
Hover your mouse over the link
What is an "inside threat"?
Employees, contractors, past employees, vendors who may pose a security risk