All tech devices should have one of these in order to help protect user information. These should not be shared with anyone.
What is a password?
Who you gonna call? Is a famous phrase from this movie
What is Ghostbusters?
These are people who originally tried to gain access into computers for intellectual curiosity, but now have malicious purposes.
Who are hackers?
This monster is wrapped in bandages
What is a Mummy?
The practice of using two different authentication methods to verify identity.
What is multi-factor authentication (or MFA/2FA)?
This is the term used to describe a strong password that uses a combination of numbers and letters.
What is an alphanumeric (password)?
The location of Dracula's castle
What is Romania?
Hackers make these computer programs so that the program may spread or self-replicate
What is a virus?
This ancient creature, sewn together from corpse parts and sparked to life, is both tragic and terrifying.
What is Frankenstein?
This type of malware disguises itself as legitimate software to trick users into installing it.
What is a Trojan (or Trojan horse)?
Whenever you leave your computer, even for a few minutes, you should perform this action.
What is (to) lock your computer?
Stingy Jack, a figure from Irish folklore, is said to have inspired this glowing Halloween decoration.
what is a jack-o’-lantern?
These malware programs track where you go on the Internet and what you type into your keyboard.
What is spyware?
This monster only comes out during a full moon
What is a Werewolf?
This attack floods a system with traffic to make it unavailable to legitimate users.
What is a DDoS (Distributed Denial of Service) attack?
These items can be carried with you. When they're not properly password protected, that can result in a cyber security breach
What are endpoints
The average amount people spend on Halloween candy.
What is $100?
This type of malware prevents users from accessing their system by locking them out until the user pays the hacker for the key.
What is ransomware?
This horned Christmas demon from European folklore punishes naughty children by dragging them away in chains.
Who is Krampus?
The principle of giving users only the access rights they need to perform their job.
What is least privilege?
This protocol, indicated by a padlock icon in your browser, encrypts data between your computer and a website.
What is https://?
The location of the biggest Halloween Parade
What is New York?
Strange computer behavior, keyboards not typing or mouses not clicking, computers crashing or restarting on their own
What is a malware infection?
This silent figure in a white mask stalks his victims relentlessly in a long-running horror film franchise.
Who is Michael Myers?
This attack technique involves an adversary remaining undetected in a network for an extended period to steal data.
What is an APT (Advanced Persistent Threat)?