Phishing
Passwords
Physical Security
General Security
Security Events
100

True or False: Bad Grammar and spelling mistakes are often a sign of a phishing email 

True

100

An authentication method that requires two or more verification factors (such as a password and a text code) is called what?

Multi-Factor Authentication

100

What must ALL visitors do immediately upon arrival to a PGA TOUR Superstore facility?

Sign in 

100

This type of information is non-public and might be of use to competitors or harmful to PGATSS if disclosed

Confidential Information

100

The use of deception and manipulation to convince a person to reveal sensitive information or take an action.

Social Engieneering

200

What is the recommended method of reporting phishing emails at PGATSS?

"Report Phishing" Button in Outlook

200

It is important to have a different password for each individual account. Why?

If one account gets compromised, it doesn't compromise others

200

True or False: Sensitive paper files should be locked away while not in use

True

200

This feature should be utilized when sending confidential or sensitive information via email

encryption  

200

What does VPN stand for?

Virtual Private Network 

300

What is the PGATSS Information Security motto for potentially malicious E-mails?

Report It!

300

True or False: This is an example of a strong password: MoUnTaIn$

False

300

When physical files that hold confidential information are no longer needed, where should they go?

The shredding bin

300

What should you do if you think your computer has a virus or malware?

Contact IT Security at  security@pgatss.com

300

True or False: 85% of data breaches last year involved a human element

True! This is why security awareness is so important!

400

Other than technology, what is the best way for companies to avoid bad consequences from phishing attacks?

Employee awareness and education

400

Complexity combined with _______ creates a secure password

Length

400

What combination of keys will lock your keyboard when you walk away from your computer?

Ctrl+Alt+Delete then lock or Windows Button+L

400

Who is responsible for cybersecurity within our organization?

Everyone

400

What is the term for the act of deliberately pretending to be someone else on social media in order to deceive or manipulate others, often for malicious purposes?

Catfishing

500

There are several types of phishing attacks. What is the name given to the type that specifically targets an individual or group of individuals?

Spear Phishing

500

A string of words that is longer than a traditional password, easy to remember but difficult to crack?

A passphrase

500

__________ is a type of social engineering attack where an unauthorized person gains physical access to an off-limits location by following someone else in

Tailgating

500

What does IoT stand for?

Internet of Things

500

Cybercrime went up 600% due to this 

The Covid19 Pandemic