CyberSecurity Flashcards
What are the last fail-safe checks to avoid getting “phished”?
all of the above
Why are Phishing attacks happening?
both b & c
Why are users the “weakest link” in most organizations?
all of the above
True or False: Email is rarely used as a tool for cyberattacks.
false
If you believe you have received a phishing email, what should you do before clicking on any links?
either A or B
If you believe you have received a phishing email, what should you do?
all of the above
If you have PHI data within any messages in your email, how often should this information be deleted?
Weekly
What are the potential impacts of responding to a phishing attack?
all of the above
It is OK to provide my username and password based on a request within an email from Ballad Health.
False
Feedback: “Anytime you are asked for any type of personal information, you should immediately be suspicious and not provide this information without confirming with the IS Service Desk.”
If I read an email on my cell phone or tablet that may be a phishing email, you should:
A, B, or C
What are the steps to help recognize a phishing email?
all of the above
True or False: Each Ballad team member has the responsibility to ensure that email messages are deleted, and the deleted folder is emptied.
True
True or False: All QR Codes received within emails are safe to click on.
False
What are the best practices for keeping my Ballad Health password secure?
all of the above