Cybersecurity is the practice of protecting this from attacks.
What are computer systems, networks, and data?
A fake HR email asking you to to click a link is an example of this.
What is phishing?
Ransomware does this to files.
What is lock or encrypt them?
Before leaving for the day, you should do this to protect your workstation.
What is lock your computer?
In this 1999 film, a hacker discovers reality is actually a simulation.
What is The Matrix
Most cyber incidents start with this type of everyday action.
What is clicking a link or opening an email?
Phishing attacks usually try to create this feeling.
What is urgency?
Attackers demand this to restore access.
What is payment (a ransom)?
If you're unsure about a message, the safest action is to do this.
What is report it?
In this film, a programmer is pulled inside a computer system and must survive digital gladiator-style games.
What is Tron?
Cybersecurity is not just the responsibility of IT - it is shared by these individuals.
Who are all employees (everyone)?
Before clicking a link, you should always do this.
What is verify the sender?
Ransomware often begins with this type of communication.
What is a phishing email?
You should never share this with anyone.
What is your password?
In this 2004 film, a detective has to figure out if robots can break the rules and become dangerous
What is I, Robot?
Cyber attacks often rely on human behavior rather than this.
What is advanced hacking?
Text-message phishing is called this.
What is smishing?
What is backing up data, software updates, and security updates
You should avoid putting sensitive company data into this.
What is AI tools or chatbots?
This 2002 sci-fi thriller shows a future where crimes are predicted using advanced surveillance technology.
What is Minority Report?
Using the same password across sites increases this type of risk.
What is a data breach risk?
Phone-call scams pretending to be IT are called this.
What is vishing?
Clicking unknown attachments can lead to this being installed without you realizing it.
What is malware?
Using unauthorized apps or tools for work is known as this.
What is Shadow IT?
This 1982 classic explores a world of synthetic humans known as replicants and questions what it means to be human.
What is Blade Runner?