This is the term for harmful software that seeks to damage or exploit the machines that run it?
What is Malware?
BYOD
What is Bring Your Own Device?
A combination of uppercase and lowercase letters, numbers, and special characters at least 16 characters long.
What is a strong password?
This type of threat originates from within an organization.
What is an Inside Threat?
The term for the practice of regularly updating software and systems to protect against unknown vulnerabilities.
What is Patching?
This type of malicious software is designed to block access to a computer system or data until a sum of money is paid.
What is ransomware?
VPN
What is a Virtual Private Network?
You need to do this after your computer installs updates. The sooner the better!
What is reboot the computer?
This type of attack targets specific individuals by exploiting information gathered through platforms like social media accounts, company's website, and LinkedIn.
What is spear phishing?
The collective network of connected devices and the technology that facilitates communication between devices and the cloud, as well as the devices themselves.
What is IoT, or Internet of Things?
Malicious software that disguises itself as a legitimate program.
What is a Trojan Horse?
MFA
What is Multi-Factor Authentication?
The simplest and most effective way to protect your accounts from unauthorized access.
What is Multi-Factor Authentication?
This type of attack exploits human error, confusion, and manipulation to gain private information, access to restricted systems, or valuable data.
What is Social Engineering?
Cybercriminals hit the 'bullseye' when they were able to steal data from this retail company
What is Target?
A cyber attack where attackers impersonate a trustworthy entity to trick individuals into revealing sensitive information.
What is Phishing?
DDoS
What is Distributed Denial of Service?
The process of creating copies of data and storing it elsewhere for potential future recovery.
What are Backups?
These are well run groups of crooks who methodically look for computer vulnerabilities to steal large numbers of financial or credit card accounts for financial profit.
What is Organized (Cyber) Crime?
This type of cyber-attack attempts to steal your credentials through text messaging.
What is Smishing (SMS Phishing)?
A security device that monitors and controls incoming and outgoing network traffic.
What is a Firewall?
PII
What is Personally Identifiable Information?
This type of insurance protects businesses against cyber threats and data breaches
What is Cyber-Liability Insurance?
This type of sophisticated cyber-attack is a continuous computer hack that occurs under the radar and against a specific object, usually for long periods of time.
What is an APT (Advanced Persistent Threat)?
Matthew Broderick plays a high-school aged computer whiz who accidentally accesses a military computer programmed to simulate... well, precisely what the title suggest.
What is WarGames (1983)?