Go Phish
Mo Passwords Mo Problems
I Shouldn't Have Shared That
Did I Leave My Computer Running?
100

These Must Be Reported Immediately

Phishing Emails/ Spam

100

These Grant Access to Computers and are Never Shared

Passwords

100

These websites and applications provide a platform for users to share content and network in a virtual environment

Social Media

100

This Action Can Prevent Unauthorized Access to Your Computer Session When You Must Step Away

Locking Your Computer

200

This is a cyber attack that uses disguised email as a weapon

phishing

200

How often passwords need to be changed?

Every 3 months

200

World Wide Web that allows people to communicate.

Social network

200

When the computer is over heating DO NOT throw ____ to cool it off.

Water

300

This example of a phishing attack uses an email address that is familiar to the victim, like the one belonging to the organization’s CEO, Human Resources Manager, or the IT support department.

CEO Fraud

300

A mix of letters (upper and lower case), numbers, and symbols, no ties to your personal information, and no dictionary words.

Strong password

300

Be careful what you share on the internet because ...

It can never go away

300

______ will not make your computer run faster.

Physical Harm

400

Clicking an attachment, Enabling macros in Word document, Responding to a social media connection request, Using a new wi-fi hot spot. 


examples of actions in phishing emails 

400

If you must keep track of lots of different passwords, this software can hold your passwords safely so that you don't forget them.

password management software

400

What is an alien's favorite key on a keyboard?  

The space bar

400

Where did Joey go?

He ransomware 

M
e
n
u