Cybersecurity Basics
Phishing
Ransomware
Safe Habits at Work
Other
100

Cybersecurity is the practice of protecting this from attacks.

What are computer systems, networks, and data?

100

A fake HR email asking you to to click a link is an example of this.

What is phishing?

100

Ransomware does this to files.

What is lock or encrypt them?

100

Before leaving for the day, you should do this to protect your workstation. 

What is lock your computer?

100

In this 1999 film, a hacker discovers reality is actually a simulation.

What is The Matrix

200

Most cyber incidents start with this type of everyday action.

What is clicking a link or opening an email?

200

Phishing attacks usually try to create this feeling.

What is urgency?

200

Attackers demand this to restore access.

What is payment (a ransom)?

200

If you're unsure about a message, the safest action is to do this.

What is report it?

200

In this film, a programmer is pulled inside a computer system and must survive digital gladiator-style games.

What is Tron?

300

Cybersecurity is not just the responsibility of IT - it is shared by these individuals.

Who are all employees (everyone)?

300

Before clicking a link, you should always do this. 

What is verify the sender? 

300

Ransomware often begins with this type of communication.

What is a phishing email?

300

You should never share this with anyone.

What is your password?

300

In this 2004 film, a detective has to figure out if robots can break the rules and become dangerous

What is I, Robot?

400

Cyber attacks often rely on human behavior rather than this.

What is advanced hacking?

400

Text-message phishing is called this.

What is smishing?

400
Ways to protect from Ransomware attacks

What is backing up data, software updates, and security updates

400

You should avoid putting sensitive company data into this. 

What is AI tools or chatbots?

400

This 2002 sci-fi thriller shows a future where crimes are predicted using advanced surveillance technology.

What is Minority Report?

500

Using the same password across sites increases this type of risk. 

What is a data breach risk?

500

Phone-call scams pretending to be IT are called this.

What is vishing?

500

Clicking unknown attachments can lead to this being installed without you realizing it.

What is malware?

500

Using unauthorized apps or tools for work is known as this.

What is Shadow IT?

500

This 1982 classic explores a world of synthetic humans known as replicants and questions what it means to be human.

What is Blade Runner?

M
e
n
u