Life's a Breach
Open Sesame!
Plenty of Phish
Info Safety Dance
We're Banking On It
100

Unauthorized access to information by a fraudulent party.

What is a data breach?

100

Using a method outside of a password to authenticate someone logging into a system.

What is two-factor authentication?

100

This is clicked whenever a suspicious email comes into your mailbox.

What is the report phishing button?

100

These must be worn by all team members and used when scanning in and out of areas and FOC buildings.

What is your Employee Badge?

100

These are added to your phone to identify who you are when logging into our banking portals.

What are security tokens?

200

People who attempt to gain unauthorized access to computer networks.

Who are hackers or fraudsters?

200

Uniquely assigned identifiers used to log into windows, banking portals, etc.

What are Account or Login ID's?

200

A type of scam used by fraudsters to target business communications to insert themselves into the process

What is email fraud or email compromise?

200

Done every time you step away from your computer while at home or in the office. Can allow access if missed.

What is locking your computer?

200

This document and procedure assures that wires of specific monetary levels have the right people approve them as needed.

What are our wire approval levels?

300

These are large scale attacks that request specific demands be met to lift the attack.

What are ransomware attacks?

300

These can help you generate and store your passwords across applications and online sites.

What is a password manager?

300

A cyber attack that is specifically geared towards larger high profile targets.

What is whaling?

300

Theft of personality information like date of birth, credit card, bank account, or social security number.

What is Identity or PII theft?

300

This tool is used as wires are received as part of their validation process.

What is Giact?

400

Using knowledge of human nature and social skill to steal passwords, token keys or other credentials to gain access to systems.

What is social engineering?

400
Strong ones of these use characters like ?$#% and numbers for better security.

Passwords

400

The fraudulent practice of sending e-mails from a known or trusted sender in order to induce target individuals to reveal confidential information.

What is spear fishing?

400

This is done to all documents containing sensitive information from our clients or the FOC once we're done with them.

What is shredding or placing into shredder bin?

400

These instruct us on where a wire is going and the correct account and routing information to use.

What are wire instructions?

500

The weakest link in any computer system.

Who are humans?

500

Asked when first setting up a profile for a website and is used when attempting reset your password.

What are security questions?

500

Software designed to damage and destroy computers and computer systems.

What is malware or viruses?

500

This is when a fraudster follows behind someone badging into an area in hopes of unauthorized access.

What is piggy-backing or tail-gaiting? 

500

This law was meant to protect investors from fraudulent accounting and resulted in all public companies needing extensive yearly auditing.

What is the Sarbanes-Oxley Act of 2002, or SOX for short?