SlideShare a Scribd company logo
1 of 8
Q: If you receive a message that requires “immediate action” and
creates a sense of urgency, what should you do?
A: Be skeptical and carefully review
the message; it could be an attack.
A: Manually type your bank’s
website into your browser.
Q: If you receive an email
from your bank asking you to
click on a link and go to their
website, what is the most
secure way to do it?
Q: When you need a
secure connection to an
important website, such as
for online banking, how do
you verify the site?
A: Check for HTTPS at the start of
the website’s address and that the
padlock icon in the status bar is
closed.
Q: What information should you use
when entering detains into password
request questions?
A: Use information that is not publicly
known.
Do not use things such as
your birthday or pets name
making it easy for hackers to
guess.
Try creating an easy phrase to
remember…...
A: Put them in a secure shred bin or shed them
yourself and then notify your supervisor.
I understand and will follow these rules and procedures.
Employees Signature
Employees Printed Name

More Related Content

Viewers also liked

Tc nam
Tc namTc nam
Tc namKe Ma
 
Bonne et sainte année 2016
Bonne et sainte année 2016Bonne et sainte année 2016
Bonne et sainte année 2016Maguy VERTUEUX
 
Dh phia nam ngay 01.4.2016
Dh phia nam ngay 01.4.2016Dh phia nam ngay 01.4.2016
Dh phia nam ngay 01.4.2016Ke Ma
 
TCBac
TCBacTCBac
TCBacKe Ma
 
13 a final portfolio
13 a final portfolio13 a final portfolio
13 a final portfolioHenry Maia
 
ma tinh ts
ma tinh tsma tinh ts
ma tinh tsKe Ma
 
bang phan chia kv ut
bang phan chia kv utbang phan chia kv ut
bang phan chia kv utKe Ma
 
Ma khu vuc ut
Ma khu vuc utMa khu vuc ut
Ma khu vuc utKe Ma
 
Cd phia bac ngay 01.4.2016
Cd phia bac ngay 01.4.2016Cd phia bac ngay 01.4.2016
Cd phia bac ngay 01.4.2016Ke Ma
 
Cd phia nam ngay 01.4.2016(1)
Cd phia nam ngay 01.4.2016(1)Cd phia nam ngay 01.4.2016(1)
Cd phia nam ngay 01.4.2016(1)Ke Ma
 
Ga la gi, lien ket ga
Ga la gi, lien ket gaGa la gi, lien ket ga
Ga la gi, lien ket gaKe Ma
 

Viewers also liked (12)

Tc nam
Tc namTc nam
Tc nam
 
Bonne et sainte année 2016
Bonne et sainte année 2016Bonne et sainte année 2016
Bonne et sainte année 2016
 
Dh phia nam ngay 01.4.2016
Dh phia nam ngay 01.4.2016Dh phia nam ngay 01.4.2016
Dh phia nam ngay 01.4.2016
 
TCBac
TCBacTCBac
TCBac
 
525
525525
525
 
13 a final portfolio
13 a final portfolio13 a final portfolio
13 a final portfolio
 
ma tinh ts
ma tinh tsma tinh ts
ma tinh ts
 
bang phan chia kv ut
bang phan chia kv utbang phan chia kv ut
bang phan chia kv ut
 
Ma khu vuc ut
Ma khu vuc utMa khu vuc ut
Ma khu vuc ut
 
Cd phia bac ngay 01.4.2016
Cd phia bac ngay 01.4.2016Cd phia bac ngay 01.4.2016
Cd phia bac ngay 01.4.2016
 
Cd phia nam ngay 01.4.2016(1)
Cd phia nam ngay 01.4.2016(1)Cd phia nam ngay 01.4.2016(1)
Cd phia nam ngay 01.4.2016(1)
 
Ga la gi, lien ket ga
Ga la gi, lien ket gaGa la gi, lien ket ga
Ga la gi, lien ket ga
 

Similar to UCSFB-CHO EVS Cyber Training

Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityChristian Heilmann
 
How to identify unsafe websites
How to identify unsafe websitesHow to identify unsafe websites
How to identify unsafe websitesmaha5960
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesHuman Resources & Payroll
 
Protecting your privacy online county leadership conference
Protecting your privacy online  county leadership conferenceProtecting your privacy online  county leadership conference
Protecting your privacy online county leadership conferenceMolly Immendorf
 
Awareness Guide For Social Media Influencers - Influencers Meetup - CyberForg...
Awareness Guide For Social Media Influencers - Influencers Meetup - CyberForg...Awareness Guide For Social Media Influencers - Influencers Meetup - CyberForg...
Awareness Guide For Social Media Influencers - Influencers Meetup - CyberForg...cyberforgeacademy
 
Protecting your privacy online
Protecting your privacy onlineProtecting your privacy online
Protecting your privacy onlineMolly Immendorf
 
How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?Ankush Sarkar
 
OpenID Security
OpenID SecurityOpenID Security
OpenID Securityeugenet
 
Molly protecting your privacy online county leadership conference
Molly protecting your privacy online  county leadership conferenceMolly protecting your privacy online  county leadership conference
Molly protecting your privacy online county leadership conferencecetechservices
 
Website Threats for Dummies
Website Threats for DummiesWebsite Threats for Dummies
Website Threats for DummiesLiberteks
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1Rozell Sneede
 
Protecting your privacy online
Protecting your privacy onlineProtecting your privacy online
Protecting your privacy onlineMolly Immendorf
 
Web + Social Media + Cyber Security for Lawyers
Web + Social Media + Cyber Security for LawyersWeb + Social Media + Cyber Security for Lawyers
Web + Social Media + Cyber Security for LawyersJoshua Weaver
 
Believe It Or Not SSL Attacks
Believe It Or Not SSL AttacksBelieve It Or Not SSL Attacks
Believe It Or Not SSL AttacksAkash Mahajan
 

Similar to UCSFB-CHO EVS Cyber Training (20)

Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application Security
 
How to identify unsafe websites
How to identify unsafe websitesHow to identify unsafe websites
How to identify unsafe websites
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 
Protecting your privacy online county leadership conference
Protecting your privacy online  county leadership conferenceProtecting your privacy online  county leadership conference
Protecting your privacy online county leadership conference
 
Awareness Guide For Social Media Influencers - Influencers Meetup - CyberForg...
Awareness Guide For Social Media Influencers - Influencers Meetup - CyberForg...Awareness Guide For Social Media Influencers - Influencers Meetup - CyberForg...
Awareness Guide For Social Media Influencers - Influencers Meetup - CyberForg...
 
Protecting your privacy online
Protecting your privacy onlineProtecting your privacy online
Protecting your privacy online
 
How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?
 
OpenID Security
OpenID SecurityOpenID Security
OpenID Security
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Molly protecting your privacy online county leadership conference
Molly protecting your privacy online  county leadership conferenceMolly protecting your privacy online  county leadership conference
Molly protecting your privacy online county leadership conference
 
Maintaining Online Privacy
Maintaining Online PrivacyMaintaining Online Privacy
Maintaining Online Privacy
 
Ffiec presentation
Ffiec presentationFfiec presentation
Ffiec presentation
 
Website Threats for Dummies
Website Threats for DummiesWebsite Threats for Dummies
Website Threats for Dummies
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
Protecting your privacy online
Protecting your privacy onlineProtecting your privacy online
Protecting your privacy online
 
Cybersecurity in communication
Cybersecurity in communicationCybersecurity in communication
Cybersecurity in communication
 
Web + Social Media + Cyber Security for Lawyers
Web + Social Media + Cyber Security for LawyersWeb + Social Media + Cyber Security for Lawyers
Web + Social Media + Cyber Security for Lawyers
 
Online Security
Online SecurityOnline Security
Online Security
 
Believe It Or Not SSL Attacks
Believe It Or Not SSL AttacksBelieve It Or Not SSL Attacks
Believe It Or Not SSL Attacks
 

UCSFB-CHO EVS Cyber Training

  • 1.
  • 2.
  • 3. Q: If you receive a message that requires “immediate action” and creates a sense of urgency, what should you do? A: Be skeptical and carefully review the message; it could be an attack. A: Manually type your bank’s website into your browser. Q: If you receive an email from your bank asking you to click on a link and go to their website, what is the most secure way to do it?
  • 4. Q: When you need a secure connection to an important website, such as for online banking, how do you verify the site? A: Check for HTTPS at the start of the website’s address and that the padlock icon in the status bar is closed.
  • 5. Q: What information should you use when entering detains into password request questions? A: Use information that is not publicly known.
  • 6. Do not use things such as your birthday or pets name making it easy for hackers to guess. Try creating an easy phrase to remember…...
  • 7. A: Put them in a secure shred bin or shed them yourself and then notify your supervisor.
  • 8. I understand and will follow these rules and procedures. Employees Signature Employees Printed Name