Do not store you passwords openly, use password managers like _________________
The strongest password is: Grrrrrrrr8!!!, Go^sa!, iLm!J@c)&dl>A
A secure and safe website should start with ____________________
____________ are necessary components to develop positive security habits.
When someone sends an e-mail with a link to a bogus website it is called?
This can slow down your computer AND watch everywhere you go on the internet?
Pretexting can also be used to impersonate co-workers, police, bank, tax authorities, , insurance investigators by a ___________________ to get personal information.
It is not allowed to use your co-workers username and password to log in to any thyssenkrupp's ___________________ resources or webistes.
A ________________ is a type of malware that is often disguised as legitimate software that can be employed by cyber-thieves and hackers trying to gain access to users' systems. and tricked by some form of social engineering into loading and executing Trojans on their systems.
You should not just check identity, you should also confirm____________
Do not plug in unknown _________________ and hand it over to IT Helpdesk
Use a _________________ to store printed sensitive data.
Do not use the same password for your Apple-ID as you are using your _____________
Do not allow other persons to use your computer! It may be used for _______________
Dont talk about __________ data in public! Even if you think no one is listening.
____________ transfers are stronly encrypted and more secure using passwords.
Your best defense is _______________________
Be careful when handling ________________ of questionable origin - they cannot only cipher off information but also contain viruses and spyware that might not be recognised by your virus scanner and cause serious damage to our Company.
Risk of using portable storage media can include _____________________
Always lock your laptop/pc when leaving your desk with using __________________