Cybersecurity's core function is..
Keeping data secure
Most common type of phishing
Email Phishing
This is the cadence that of our phishing assessments
Quarterly
Christmas movie that stars Bruce Willis
Die Hard
Unsolicited emails designed to trick recipients into what? (3 answers)
Clicking on a link
Downloading an attachment
Providing sensitive information
Voice phishing is called..
Vishing
What does ROR stand for?
Repeat Offender Report
4 types of phishing
Vishing
Smshing
Spear
Whaling
HTTPS
Phishing is reponsible for ___ of all successful cyberattacks
90-95%
Phishing through text messages are called..
Smshing
What is monitored after the assessment is launched
Phishing inbox
Quarantine
Phishing relies on what technique?
Social Engineering
Targeted phishing where attackers focus on a specific individual
Spear phishing
3 ways a scenario is developed
Seasonal
Company related
Real phishing attempts
What month is Cybersecurity Awareness Month
October
4 Red flags of a phishing attempt
External Sender
Typos/Bad Grammer
Bad Link
Multiple Recipients
Sense of urgency
Recipient has been Bccd
Who are the parties that are notified after a team member has failed 3 or more times
Team member
Supervisor
First Level Officer