Cyber Quick Tips
Exploits/Attacks
100

This keyboard shortcut should be used every time you leave your workstation to ensure your screen is locked

What is "Windows" key + "L" Key?

100

This attack type is the most common, involving sending fraudulent emails to unsuspecting users, to either click a link or download an attachment

What is Phishing?

200

These are the fields you should double check to ensure your email is going to the correct recipient

What are the To/CC/BCC fields?
200

This type of attack work by flooding systems, servers, and/or networks with traffic to overload resources and bandwidth

What is Denial-of-Service (DoS)?

300

This type of email address should not be used for work related purposes

What is a personal email?

300

This term, a combination of 2 words encompasses various types of attacks including spyware, viruses, and worms 

What is Malware?

400

Occurs when an attacker intercepts a two-party transaction, inserting themselves in the middle

 What is Man-in-the-Middle?

500

This term refers to a vulnerability that it is new and recently announced — before a patch is released and/or implemented

What is a Zero-Day?

M
e
n
u