"Sew" this on to update your software.
A patch
This is a person who breaks into a computer system for politically or socially motivated purposes.
A Hacktivist
This type of malware may masquerade as legitimate software but contain malicious instructions that may harm your computer.
A Trojan
The popular Nigerian Internet sensation that pleaded guilty for BEC?
Hushpuppi
This makes the use of stolen credentials very difficult
Multi-factor Authentication
This image in the top left or right corner of your web browser indicates you are on a secure website.
A lock icon
The weakest link in Cybersecurity.
Human Beings
This is a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless money is paid.
Ransomware
True or False?
Your bank will email you to send sensitive information to them?
FALSE
Always use this when connected to a public Wi-Fi
Virtual Private Network
Carrying these with you and not properly password protecting them can result in a cybersecurity breach.
mobile devices (laptops, cellphones, flash drives, etc.)?
This is the risk presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.
Insider Threat/Attack
These programs track where you go on the Internet and what you type into your keyboard.
Spyware
The amount lost to cybercriminals from BEC in 2020, according to the FBI?
$1.8 Billion
Name any two types of hybrid work models
At-will, split-week, shift-work, week-by-week
This security technology stops eavesdropping with the use of virtual tunnels and encryption.
Virtual Private Network (VPN)
_ 1, 2, 3. This term refers to a software vulnerability that is unknown to vendors.
Zero Day
This malware computer program replicates itself in order to spread to other computers.
A Worm
Unscramble the following phrase
RED UOCFA
CEO FRAUD
The first policy to implement in a distributed work environment
BYOD/WFH/Hybrid work policy
This is used to obfuscate your data.
Encryption
Malware is a portmanteau of these two words.
Malicious Software
This devastating ransomware attack in 2017 infected over 300,000 computers.
WannaCry
____ is the manipulation of email headers to deceive the email recipient that it is from a legitimate source.
Spoofing
How organizations separate work data from company data in a distributed work environment
Enterprise Mobility Management (MDM, MAM, or MCM)