Show
Some Quick Tips to Remember:
Five Ways to Protect Yourself:1. Delete any request for personal information or passwords. Nobody should be contacting you for your personal information via email unsolicitedly. If you get asked for it, it’s a scam.2. Reject requests for help or offers of help. Social engineers can and will either request your help with information or offer to help you (i.e posing as tech support). If you did not request any assistance from the sender, consider any requests or offers a scam. Do your own research about the sender before committing to sending them anything.3. Set your spam filters to high. Your email software has spam filters. Check your settings, and set them to high to avoid risky messages flooding into your inbox. Just remember to check them periodically as it is possible legitimate messages could be trapped there from time to time.4. Secure your devices. Install, maintain and update regularly your anti-virus software, firewalls, and email filters. Set your automatic updates on if you can, and only access secured websites. Consider VPN.5. Always be mindful of risks. Double check, triple check any request you get for the correct information. Look out for cybersecurity news to take swift actions if you are affected by a recent breach. I recommend subscribing to a couple of morning newsletter to keep you up to date with the latest in InfoSec like Cyware or BetterCloud Monitor. If you are a podcast person, Decrypted by Bloomberg, DIY Cyber Guy and Reply All offer easy to digest information and news that’s very user-friendly.What is the best way to protect against social engineering quizlet?The best defense against social engineering attacks is a comprehensive training and awareness program that includes social engineering. The training should emphasize the value of being helpful and working as a team, but doing so in an environment where trust is verified and is a ritual without social stigma.
Which of the following is a good practice for protecting computing devices Citi quizlet?Which of the following is a good practice for controlling computer access? Picking strong passwords and protecting them appropriately.
Which of the following is not a good practice for information security?Answer: The correct answer is 'Always connect your office-provided laptop to open'. Explanation: Information security entails more than just protecting data from unauthorized access.
Which of the following is a correct statement about the balance among prevention detection and response PDR )? Quizlet?Which of the following is a correct statement about the balance among prevention, detection, and response (PDR)? The greater the sensitivity and quantity of the data at issue, the more carefully the balance among these three must be evaluated.
|