What is a best practice for providing security training?
Provide security training for users before they connect to the network for the first time
Why is specialized security training important?
Different security requirements exist for different departments, such as accounting and shipping
Who else should receive security training besides employees?
Third parties such as contractors, partners, and suppliers
What should be tracked regarding security training?
Who has been trained and who has yet to be trained
Why is it important to document security policies?
To ensure they can be referenced by every user in the company
How can security policies be made accessible?
By having online access as part of the intranet and including them in employee handbooks
What does situational awareness entail for users?
Always looking for threats while performing their job
What should users be cautious of regarding email?
Email links or attachments that might be associated with phishing
What physical security threat should users be aware of?
Receiving suspicious envelopes that contain USB drives
What are insider threats?
Difficult-to-identify threats that come from within the organization
What approach should be taken to identify insider threats?
A multi-factored approach with multiple approvals and active file monitoring
What should be done if there are changes in critical processes?
Be informed immediately of any changes
What is important for password management?
Implementing secure password strategies and standard requirements
What can be used in a Windows environment to enforce password policies?
Group policy to enforce password length and complexity
What should user training include regarding removable media?
Awareness of security concerns related to unknown USB drives
What is a risk when users are not in the office?
Using unknown cables to charge mobile devices
What technique do attackers often use to gather information?
Social engineering
What should users learn about social engineering?
Common techniques and how to report them to the IT security team
What is operational security from the attacker’s perspective?
Understanding security threats by interpreting them as an attacker would
What type of data should users be aware of?
Sensitive data that requires additional security
What security concern arises for users working from home?
Preventing family or friends from accessing work systems
What additional security measures may be needed for remote work?
Endpoint security and increased security for VPN access