If a suspicious package is found, what are 3 things you should NOT do?
Do not open or shake it.
Do not carry to show others.
Do not sniff, touch or taste.
What is suspicious behavior?
Is any observed behavior that could indicate terrorism or terrorism-related crime
What is Safety and Security non-emergency number?
4357
Hackers
Malware
Botnets
Phishing emails
Employee pick up/drop off area
What are 4 things you look for, to recognize a suspicious letter/package?
Handwritten or poorly typed address.
Strange odors and sounds.
Excessive tape or string.
Fluids or wires coming out of it.
Can a person questioning individuals at a level beyond curiosity about a building’s purpose, operations, security procedures and/or personnel, shift changes, etc. be considered Suspicious activity/person?
Yes
What is Safety and Security emergency number?
88
What should you do, if you receive a scam email at work?
Do not open it; report it as phishing email.
Who is responsible for cleaning up bios?
Housekeeping team
Who should you notify if a suspicious package is found?
Security
How do you report suspicious activity?
Describe specifically what you observed, including:
During an emergency you should evacuate the building by using ____________?
Exit Signs
What is the normal password length recommended and what should they contain?
Passwords that contain at least 8 characters with a combination of letters, numbers and symbols. Strong passwords are less likely to be hacked than very generic passwords.
If a visitor is found in the Heart of house, without any credentials. Where should you escort him/her, to obtain one?
Safety and Security window
Can you receive Suspicious packages/envelope at home?
Yes, suspicious packages may be delivered at home or at the Workplace.
An individual passing through the lobby, taking pictures of cameras, the Front Desk, taking notes and counting paces; sketching floor plans, etc. can be considered Suspicious activity?
Yes
If you see a suspicious person not wearing uniform and no credentials, what should you do?
Approach the individual and ask if they have an ID, Name Tag or visitors pass.
If not fully comfortable with approaching him/her, note the description of the person and the location they were heading to and Contact Safety and Security.
When leaving your computer unattended, what must you do?
Physically lock it to prevent theft of the machine.
We also suggest that users lock the screen with a password to safeguard data.
What is the difference between Safety and Security?
Safety - the condition of being protected from or unlikely to cause danger, risk, or injury.
Security - the quality or state of being secure from any danger.
.
What is security?
The state of being free from danger or threat.
Who should you call if you suspect of suspicious activity?
Safety and Security
What should all employees, partners and Contractors be wearing in the Heart of house?
Credentials (Name tag, ID, or visitors pass).
Uniform only is not acceptable and all credentials must be visible at all times.
What information should you limit yourself from sharing in online?
Birth dates, anniversaries, addresses, phone numbers.
Protect yourself from identity theft and other scams by limiting what information you disclose online and who can see that information.
Can you name, all of the Security chain of command?
Mike Vazquez - Director
Adilson Barros - Assistant Director
Sarah Norris - Manager
JC De Leon, Krisia Lopez, Angela Kantner & Jose Crespo - Supervisors