Batten Down The Hatches
Types Of Threats
Hackers Gonna Hack
BEC
WFH
100

"Sew" this on to update your software.

A patch

100

This is a person who breaks into a computer system for politically or socially motivated purposes.

A Hacktivist

100

This type of malware may masquerade as legitimate software but contain malicious instructions that may harm your computer.

A Trojan

100

The popular Nigerian Internet sensation that pleaded guilty for BEC?

Hushpuppi

100

This makes the use of stolen credentials very difficult

Multi-factor Authentication

200

This image in the top left or right corner of your web browser indicates you are on a secure website.

A lock icon

200

The weakest link in Cybersecurity.

Human Beings

200

This is a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless money is paid.

Ransomware

200

True or False?

Your bank will email you to send sensitive information to them?

FALSE

200

Always use this when connected to a public Wi-Fi

Virtual Private Network

300

Carrying these with you and not properly password protecting them can result in a cybersecurity breach.

mobile devices (laptops, cellphones, flash drives, etc.)?

300

This is the risk presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.

Insider Threat/Attack

300

These programs track where you go on the Internet and what you type into your keyboard.

Spyware

300

The amount lost to cybercriminals from BEC in 2020, according to the FBI?

$1.8 Billion

300

Name any two types of hybrid work models

At-will, split-week, shift-work, week-by-week

400

This security technology stops eavesdropping with the use of virtual tunnels and encryption.

Virtual Private Network (VPN)

400

_ 1, 2, 3. This term refers to a software vulnerability that is unknown to vendors.

Zero Day

400

This malware computer program replicates itself in order to spread to other computers.

A Worm

400

Unscramble the following phrase

RED UOCFA

CEO FRAUD

400

The first policy to implement in a distributed work environment

BYOD/WFH/Hybrid work policy

500

This is used to obfuscate your data.

Encryption

500

Malware is a portmanteau of these two words.

Malicious Software

500

This devastating ransomware attack in 2017 infected over 300,000 computers.

WannaCry

500

____ is the manipulation of email headers to deceive the email recipient that it is from a legitimate source.

Spoofing

500

How organizations separate work data from company data in a distributed work environment

Enterprise Mobility Management (MDM, MAM, or MCM)

M
e
n
u