True or False: Bad Grammar and spelling mistakes are often a sign of a phishing email
True
An authentication method that requires two or more verification factors (such as a password and a text code) is called what?
Multi-Factor Authentication
What must ALL visitors do immediately upon arrival to a PGA TOUR Superstore facility?
Sign in
This type of information is non-public and might be of use to competitors or harmful to PGATSS if disclosed
Confidential Information
The use of deception and manipulation to convince a person to reveal sensitive information or take an action.
Social Engieneering
What is the recommended method of reporting phishing emails at PGATSS?
"Report Phishing" Button in Outlook
It is important to have a different password for each individual account. Why?
If one account gets compromised, it doesn't compromise others
True or False: Sensitive paper files should be locked away while not in use
True
This feature should be utilized when sending confidential or sensitive information via email
encryption
What does VPN stand for?
Virtual Private Network
What is the PGATSS Information Security motto for potentially malicious E-mails?
Report It!
True or False: This is an example of a strong password: MoUnTaIn$
False
When physical files that hold confidential information are no longer needed, where should they go?
The shredding bin
What should you do if you think your computer has a virus or malware?
Contact IT Security at security@pgatss.com
True or False: 85% of data breaches last year involved a human element
True! This is why security awareness is so important!
Other than technology, what is the best way for companies to avoid bad consequences from phishing attacks?
Employee awareness and education
Complexity combined with _______ creates a secure password
Length
What combination of keys will lock your keyboard when you walk away from your computer?
Ctrl+Alt+Delete then lock or Windows Button+L
Who is responsible for cybersecurity within our organization?
Everyone
What is the term for the act of deliberately pretending to be someone else on social media in order to deceive or manipulate others, often for malicious purposes?
Catfishing
There are several types of phishing attacks. What is the name given to the type that specifically targets an individual or group of individuals?
Spear Phishing
A string of words that is longer than a traditional password, easy to remember but difficult to crack?
A passphrase
__________ is a type of social engineering attack where an unauthorized person gains physical access to an off-limits location by following someone else in
Tailgating
What does IoT stand for?
Internet of Things
Cybercrime went up 600% due to this
The Covid19 Pandemic