This is the term for harmful software that seeks to damage or exploit the machines that run it.
What is Virus/Malware?
BYOD
What is Bring Your Own Device?
Daily Double!
The most common type of cyber attack.
This type of threat originates from within an organization.
What is an Inside Threat?
Name two types of authentication, for MFA.
Password, Fingerprint, Facial Recognition, Geo Location, PIN, SecureKey
This type of malicious software is designed to lock access to a computer system or data until a sum of money is paid.
What is ransomware?
VPN
What is a Virtual Private Network?
You need to do this after your computer installs updates. The sooner the better!
What is reboot the computer?
This type of attack targets specific individuals by exploiting information gathered through platforms like social media accounts, company's website, and LinkedIn.
What is spear phishing?
The collective network of connected devices and the technology that facilitates communication between devices and the cloud, as well as the devices themselves.
What is IoT, or Internet of Things?
Malicious software that disguises itself as a legitimate program.
What is a Trojan Horse?
MFA
What is Multi-Factor Authentication?
The simplest and most effective way to protect your accounts from unauthorized access.
What is Multi-Factor Authentication?
This type of attack exploits human error, confusion, and manipulation to gain private information, access to restricted systems, or valuable data.
What is Social Engineering?
These small messages on websites track your browsing preferences.
(They also taste quite delicious!)
What are cookies?
A cyber attack where attackers impersonate a trustworthy entity to trick individuals into revealing sensitive information.
What is Phishing?
SSO
What is Single Sign On?
The term for the practice of regularly updating software and systems to protect against unknown vulnerabilities.
What is Patching?
This type of cyber-attack attempts to steal your credentials through text messaging.
What is Smishing (SMS Phishing)?
Daily Double!
What the āSā in HTTPS stands for.
A security device that monitors and controls incoming and outgoing network traffic.
What is a Firewall?
PII
What is Personally Identifiable Information?
This simple action helps keep your computer safe when you step away from it.
What is Locking your screen?
This term is used to describe someone entering a secure area by following someone with legitimate access.
What is Tailgating?
The process of converting data into an unreadable format to protect it from unauthorized access.
What is encryption?