Information Security Awareness
What are the three main ways you can safeguard Personally Identifiable Information (PII)? Select 3
1. Limit who has access to it 2. store it securely and lock it up when not in use 3. once it is no longer needed, shred it using the secure shred bin
What can you do to determine if an email is suspect? select 4
1. Use common sense 2. look for lazy spelling mistakes 3. hover over hyperlinks to see the actual URL its connected to 4. consider if you know the sender or if it makes sense for them to be contacting you
which of these might be considered a violation of security procedures? select three (3)
1. leaving paperwork on your desk when you leave for the day 2. storing sensitive information in unlocked file cabinets or drawers 3. writing down your password and sticking it to the bottom of your keyboard
Payment Card Industry (PCI) Standards dictate that we must: select four (4)
1. never enter credit card information onto anything except authorized forms 2. never write down the three digit security code typically found on the back of the card 3. keep credit card information secured at all times 4. dispose of credit card information in secure ways
Which of these is NOT an example of a social engineering practice?
Requesting you provide login credentials or other personal information
What should you do if you receive an email with an attachment that you suspect has a virus?
delete the entire email immediately and notify information security
Bad actors are seldom interested in targeting Life Time
false
It is acceptable to share Life Time passwords with other co-workers or the IT Support Desk
false
All team members need to safeguard personal information for member, team members,
guests and vendors
if you suspect an email or text message to be malicious, what should you do?
immediately delete it
Which of these is considered a violation of security procedures?
leaving your computer/workstation unlocked when you leave
A spoofing email may use the name of a person you know or a familiar company
true
Social engineering pr phishing emails are often designed to prey on our trusting nature
true