| passwords | Information Security | Cyber | Physical Security | Disaster Recovery | 
|---|---|---|---|---|
| 
						
					 
					  What are more than 8 characters, letters numbers, symbols					 
					
					 Name 3 characteristics of a strong password 
					 | 
				
				
						
					 
					  what is patching					 
					
					 I am the reason we reboot our PC's every night 
					 | 
				
				
						
					 
					  What is cyber risk					 
					
					 The increased probability that the very-high impact, internet-based risks and threats we once thought were improbable will harm our networks 
					 | 
				
				
						
					 
					  What is the clean desk policy					 
					
					 The policy that requires all sensitive information be removed from your desk, screens, and spaces when unattended. 
					 | 
				
				
						
					 
					  What is Business Continuity Plan					 
					
					 Its initials are BCP 
					 | 
						
| 
						
					 
					  What is keypass or an encrypted database					 
					
					 I am the safest place to store your passwords 
					 | 
				
				
						
					 
					  What is Non Public Customer Information					 
					
					 I am also known as NPCI 
					 | 
				
				
						
					 
					  What is a Data Loss Prevention System					 
					
					 I am also known as a DLP System 
					 | 
				
				
						
					 
					  what is the Blue Bin or large shred bin					 
					
					 The place I discard any trash that has PII, NCPI, or Bank proprietary information. 
					 | 
				
				
						
					 
					  What is the Auburn Branch					 
					
					 The Bank's disaster recovery site 
					 | 
						
| 
						
					 
					  what is a post it note under the keyboard					 
					
					 I am the worst and most common place to hide a password 
					 | 
				
				
						
					 
					  What is personally identifiable information					 
					
					 This may be referred to as PII 
					 | 
				
				
						
					 
					  What is ransomeware					 
					
					 This evil malware encrypts your data for ransom (usually in bit coin) 
					 | 
				
				
						
					 
					  What is skimming					 
					
					 The act of stealing Debit/ATM card data from a reader placed over a real reader on an ATM or other retail payment device. 
					 | 
				
				
						
					 
					  What are 
					generator dedicated DR PC's dedicated DR Servers physical supplies 
					 List three thing the DR site has that others don't 
					 | 
						
| 
						
					 
					  what is a short sentence or phrase					 
					
					 This is the easiest way to create and remember a strong password 
					 | 
				
				
						
					 
					  What is passwords 
					limit access encryption segmentation 
					 Name an example of logical security 
					 | 
				
				
						
					 
					  What is Phishing					 
					
					 I am the most common way to to get attack and or Hack 
					 | 
				
				
						
					 
					  What is ebay					 
					
					 Easiest place to buy skimming kits (devices, cameras, software) 
					 | 
				
				
						
					 
					  at least quarterly, all departments annually					 
					
					 The frequency at which we perform DR tests 
					 | 
						
| 
						
					 
					  what is Birthdays, Hobbies, Sports, Pets, Dictionary, etc 
					or something easily guessed 
					 This should never be part of a password 
					 | 
				
				
						
					 
					  What is GLBA or Privacy ACT or Mass 201 CMR 17					 
					
					 Name a regulation pertaining to Information Security 
					 | 
				
				
						
					 
					  What is 
					large targets easy to set up don't need high percentage to click 
					 Name some reasons Phishing is so popular 
					 | 
				
				
						
					 
					  What are 
					alarms vaults access system cash recyclers cameras lighting mirrors 
					 Name 3 security Devices found in a branch 
					 | 
				
				
						
					 
					  What are 
					replicated to Franklin servers replicated to auburn servers saved to local server replicated to COCC cloud copied to external hard drive 
					 List 2 ways data is backed up 
					 |