This is the most common method used to verify a user's identity online.
What is a password?
This major retailer didn’t quite ‘hit the mark’ in 2013 when a massive data breach exposed 40 million credit card details.
What is Target?
A program that is designed only to read Hyper Text Markup Language (HTML) web pages downloaded from Internet websites.
What is a browser? (or web browser)
This authentication method requires two or more verification factors, such as a password and a fingerprint.
What is Multi-Factor Authentication (MFA)?
In January 2025, this AI company accidentally exposed over a million lines of sensitive data, including chat histories and secret keys.
What is DeepSeek?
This access control model grants users the minimum level of access needed to perform their job.
What is the Principle of Least Privilege?
The use of personality, knowledge of human nature and social skills to steal passwords, keys tokens or other credentials to gain access to systems.
What is Social Engineering?
In December 2024, the Biden administration proposed new cybersecurity regulations targeting this sector to prevent significant data breaches.
What is the healthcare sector? - updates to HIPAA
This authentication factor is something the user has, such as a security token or smart card.
What is a possession factor? - Something you have
In late 2024, Russian hackers impersonated remote IT support staff on this platform to gain unauthorized access and deploy ransomware.
What is Microsoft Teams?
This attack tricks users into entering sensitive information on a fake website that looks legitimate.
What is phishing?
This centralized authentication protocol allows users to log in once and gain access to multiple systems.
What is Single Sign-On (SSO)?
In July 2024, a flawed update from this cybersecurity firm caused widespread system crashes, leading to significant global disruptions. What is the company?
What is CrowdStrike?
This type of malware hijacks internet traffic, injecting malicious code into legitimate websites.
What is a man-in-the-middle attack?