Types of attacks
Security Tools
Cyber Stats
Threats Q&A!
100

A scammer creates a fake email and sends it to thousands of people, hoping some of them will click on a link and give up their personal information. 

What is Phishing?


100

This service allows users to remain anonymous, masking their identity/location and encrypts traffic.

What is a VPN?

100

Cybercrime went up 600% due to this ongoing event

What is the Pandemic / COVID-19 / Coronavirus?

100

Within Proofpoint, VAP is an acronym for...

A.  Vulgar Aggressive Persons

B.  Verily Anonymous Protocol

C.  Very Attacked People

D.  Verified Acronym Proof

200

An independent malware program that self-replicates in order to spread from machine to machine to cause damage.

What is a (computer) worm?

200

TAP is an acronym for Proofpoint's threat dashboard tool.

200

This age generation is currently the most impacted by cybercrime.

What are Millennials?

200

Our flagship customer event live and in person in New York on September 6-7, 2023

A.  Wisdom

B.  Element

C.  Knight

D.  Protect

300

This attack type is frequently associated with BazaLoader malware and is often referred to as BazaCall. Both attack types are what Proofpoint considers to be the acronym TOAD.

300

Companies consider cybersecurity when instructing employees with a policy on BYOD, which is short for this.

What is Bring Your Own Device?

300

In this country, over 130 large-scale cyber attacks occur each year.

What is the United States?

300

The most common types of access sold on the Dark Web are valid credentials for

Remote Desk Protocol

RDP

400

This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources (often botnets).

What is Distributed Denial of Service (DDoS)?

400

This is a method of access control by which users must present multiple, separate pieces of identification, such as a password and keycard, in order to access a system.

What is multi-factor authentication?

400

Over the last year, malware on this operating system has gone up by 165%

What is MacOS?

400

This ex-government employee is famous for leaking classified cybersecurity information from the National Security Agency in 2013.

Edward Snowden

500

Criminals access someone's computer and encrypt the user's personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. 

500

When a URL has this at the beginning, it means that the information entered into the site is encrypted

500

According to Help Net Security, average price of hacked credit card with CVV

What is $17?

(Source: privacy_affairs-20062022.jpg helpnetsecurity.com


500

According to Kaspersky, who recently analyzed nearly 200 posts on the Dark Web selling access to corporate networks, access usually averages:

$3k

M
e
n
u