Threat Landscape
Impact of AI & The Human Element
Defense & Response
Comcast Support Teams
CB Security Products
100

This is a top technique used to pray on employee vulnerabilities, often in an attempt to trick them into revealing sensitive information.

What is phishing?

100

This type of skillset is consistently ranked as a top talent gap by technology leadership, which can lead to staff burnout and increased risk.

What is Cybersecurity Talent?

100

This Comcast Business service provides 24/7 threat monitoring and active cyber defense.

What is Managed Detection and Response (MDR)?

100

I am a small business owner, and I need help with my account or my service. Who do I call?

Who is Care?

100

This is the big bet security product for small businesses launching in Decemeber 2025.

What is SecurityEdge Preferred?

200

This technique was the most common method attackers used to attempt to gain initial access to systems according to the CB Threat Report.

What is drive-by compromise?

200

Employees of businesses of what size should be aware and vigilant about cybersecurity threats.

What are businesses of all sizes?

200

This acronym refers to a cloud-delivered framework combining networking and security.

What is SASE (Secure Access Service Edge)?

200

I am an Enterprise customer, and I’m getting a notification about my MDR service. Who do I contact?

Who is the Security Operations Center?

200

Which small business security solution provides the first level of cybersecurity protection?

What is SecurityEdge?

300

This type of attack uses massive amounts of internet traffic from multiple compromised computers to overwhelm and sometimes take down systems.

What is a DDoS attack?

300

This technology is both a powerful tool for defenders and an attack multiplier for cybercriminals.

What is artificial intelligence/AI?

300

True or False – SecurityEdge Preferred helps protect both inbound and outbound internet traffic.

What is TRUE?

300

I am a managed voice customer, and I need help with my service. Who do I call?

Who is the Network Operations Center?

300

Which small business security product allows you to block pings from specific geolocations?

What is SecurityEdge Preferred?

400

Attackers use this tactic to enter and control remote systems on a network, often pivoting through multiple systems and accounts to increase access.

What is Lateral Movement?

400

Artificial intelligence is enabling attackers to launch attacks with greater...

What is volume OR speed OR sophistication?

400

According to the 2025 Threat Report, Comcast Business detected how many cybersecurity events over a 12-month period?

What is 34.6 billion?

400

I am under a DDoS attack. Who do I call at Comcast Business?

Who is Customer Security Assurance?

400

What does the product UTM stand for?

What is Unified Threat Management?

500

This concept refers to attackers using legitimate system tools to avoid detection.

What is living off the land?

500

This Comcast executive is our highest security leader and penned the foreword to the 2025 CB Threat Report.

Who is Noopur Davis, EVP Chief Information Security and Product Privacy Officer, Comcast?

500

Name one way SD-WAN helps deliver better security for businesses.

What is integrated security OR end-to-end encryption OR network segmentation OR centralized management and policy enforcement OR high-availability OR secure cloud access?

500

The SMS notifications for this service are the only product-related notifications that bypass "Do Not Disturb" (the unsubscribe list).

What is DDoS?

500

Which enterprise-grade security product detects, monitors, and responds to cyberthreats?

What is Managed Detection and Response (MDR)?

M
e
n
u