What's the name of something you or a computer can catch?
Virus or a Phish
Secure websites will begin with what combo of characters?
HTTPS://
This is a word or string of characters that is used to prove identity to gain access to a resource.
Password.
This is what the acronym "VPN" stands for in the context of Cybersecurity.
Virtual Private Network.
True/False: Using the same passwords on different sites is ok as long as they are strong passwords.
False: Never use the same passwords for different accounts.
True/False: It's a good idea to turn on automatic software updates to protect your device.
True
This is the term for Voice Phishing, a conjunction of the two words which involves phone calls where attackers pretend to be someone they're not in order to trick their target.
Vishing.
Name 3 types of biometrics to verify an identity.
Acceptable answers:
Eye (Iris)
Fingerprint
Face
Voice
DNA
How do you report a suspicious email?
1. Report Phishing button
2. Forward As Attachment to nospam@partners.org
3. Report to the Service Desk
True/False: It is ok to share passwords with new employees who don’t have access yet.
False: It is never okay to share passwords with anyone.
True/False: I don’t need to worry about virus protection on my gaming systems or web-enabled devices.
False: Viruses can infect any devices that are connected to the Internet.
True/False: Caller ID can be spoofed to display a trusted name or number, making it unreliable.
True.
What is the name of our security tool for mobile phones and tablets?
Intune.
If you are a victim of identity theft what should you do?
Contact the FTC
Monitor your credit reports
Contact your bank
What is it called when you store other copies of your data in a different location than the original?
Backups
This is a security tool that protects your account by requiring a password AND an additional element for login.
What is it called when a person pretends to be calling from the “IRS” and threatens to send you to jail?
Tax scam
True/False: It's safe to leave apps you don't use anymore out of the latest version.
False: You should try to keep all software up to date, and better yet, remove unused apps entirely.
We recently rolled out a new policy requiring the use of an MFA application called this.
Okta Verify
This is a policy where no one is trusted by default from inside or outside of the network. Verification is required from everyone gaining access to the environment.