WISP (Written Information Security Plan)
Emails that are fake and want you to click on a link to give up personal information.
Phishing
Software that detects and prevents malicious malware on your devices
Antivirus or Antimalware software
How much time does it take for someone to clone your voice using voice AI technology?
2 minutes
The more we share about ourselves online, the easier it is for criminals to personalize scams to make them more believable.
True.
A strategy used to exploit a human mind's vulnerabilities to gain access to sensitive information.
Social Engineering
Malware that demands payment in order to refrain from doing some harmful action or to undo the effects of the harmful action
Ransomware
A security system that monitors and controls incoming and outgoing network traffic
Firewall
What is one of the best ways to keep your online account safe?
Multi-factor authentication
Passwords should have no more than 12 characters and are not required to have numbers or special characters.
False.
Any combination of a person's name and address, phone number, credit card, account number, social security number, date of birth, etc.
Personally Identifiable Information (PII)
An attack against a specific individual that utiiizes messaging that appeals to that person.
Spear Phishing
Tool to manage and generate complex passwords securely for different accounts
Password manager
What % of cyber attacks occur due to human error?
95%
Slack is completely secure and we don't have to worry about phishing in Slack.
False.
A method of access control by which users must present multiple, separate pieces of information in order to access a system.
Multi-factor authentication
Records the activities of the user and transmits the information to the person who wrote the malware.
Spyware
VPN (Virtual Private Network) (TunnelBear for CV)
How much money was lost in 2024 due to cyber crime?
$16.6 billion. A 33% increase from 2023.
A strong password is a good first defense for protecting your account but is best when combined with multi-factor authentication.
True
When a url has this at the beginning, it means that the information entered into the site is encrypted.
https
A type of attack that targets an organization's C-level officials to reveal sensitive information.
Whaling
The weakest link in every computer system. The one person who, through thoughtlessness, unawareness or accident, can cause loss of work products through deletion, corruption or improperly safeguarding data.
Me/You
Up to 98% of cyber attacks involve some form of social engineering. Name the different types of social engineering attacks.
Phishing, Spear phishing, Smishing, Vishing, Whaling, Baiting, Quid Pro Quo, Honey Trapping
Social engineering is about distraction and misdrection.
True.