Lock It Down πŸ”’
Inbox Invaders πŸ“«
Keep Your Tech in Check πŸ’» πŸ“±
Malware Madness πŸ€ͺ
Breach Bosses & Data Losses
100

You should change this regularly to maintain the security of your accounts.

What is your password?

100

This type of attack tricks you into revealing personal information by pretending to be a trusted entity.

What is phishing?

100

This software helps detect and remove malicious software from your computer.

What is antivirus software?

100

This attack overwhelms a server or network by flooding it with traffic, rendering it unavailable.

What is a Denial-of-Service (DoS) attack?

100

In 2013, this retail giant suffered a massive data breach, exposing the credit and debit card information of over 40 million customers.

What is the Target data breach?

200

This method adds an extra layer of security by requiring two forms of verification to access an account.

What is two-factor authentication (2FA)?

200

If you receive an unexpected email asking for sensitive information, you should do this.

What is verify the sender or report it to IT?

200

To prevent unauthorized access, always do this before leaving your computer unattended.

What is lock your screen?

200

This type of attack uses fraudulent emails or websites to trick individuals into revealing sensitive information like passwords or credit card numbers.

What is phishing?

200

In May 2021, this major U.S. oil company was hit by a ransomware attack, leading to gas shortages across the East Coast.

What is the Colonial Pipeline ransomware attack?

300

This tool can help you create and store complex passwords securely.

What is a password manager?

300

If an email urges you to act quickly or provides a link to a suspicious website, it might be this.

What is a phishing attempt?

300

You should avoid using this type of device to access sensitive company information.

What is a public or shared computer?

300

This type of attack involves manipulating or deceiving individuals into divulging confidential information, such as login credentials, often over the phone or email.

What is social engineering?

300

In 2011, this popular gaming company’s network was breached, exposing the data of 77 million users and causing its online services to be down for weeks.

What is the Sony PlayStation Network hack?

400

This should be done to your mobile devices to prevent unauthorized access if they are lost or stolen.

What is set a password, PIN, or biometric lock?

400

You should always do this to confirm the identity of a email sender asking for sensitive information.

What is verify the sender's identity through a known contact method?

400

If your computer suddenly slows down and displays unfamiliar pop-ups, it might be infected with this.

What is malware?

400

This attack occurs when an individual within an organization abuses their access privileges to steal, destroy, or compromise sensitive data.

What is an insider threat?

400

In 2013, this former U.S. government contractor leaked classified information about global surveillance programs, sparking worldwide debates about privacy.

Who is Edward Snowden?

500

You should avoid using the same one of these across multiple accounts to reduce risk.

What is a password?

500

This is what you should do if you receive an email from an unknown sender with an attachment.

What is do not open the attachment and report it to IT?

500

This is the first line of defense for protecting your computer against external threats.

What is a firewall?

500

Attachment malware often allows the hacker to do this.

What is remotely access your computer?
500

In 2020, this widely used IT management software was compromised, leading to one of the largest supply chain cyberattacks in history.

What is the SolarWinds cyberattack?

M
e
n
u