This browser symbol (a padlock) means your website connection is secure.
What is the HTTPS padlock?
The hospital’s annual cybersecurity training starts in this month each year.
What is October?
This trickster hides malicious code inside a harmless-looking program or file.
What is a Trojan horse?
Password123 ain’t cutting it, partner. What’s the recommended minimum length for a strong password?
What is at least 12 characters?
You should avoid downloading apps from these untrusted sources.
What are third-party or unofficial websites?
If you spot a suspicious email, use this method instead of the old Phish Alert button.
What is forward it to Report Phish (new method)?
Outlaws who use infected computers to launch massive attacks are part of this.
What is a bot or botnet?
MFA stands for this, and it’s one of the Sheriff Firewall’s favorite tools.
What is multi-factor authentication?
It’s best not to use this kind of Wi-Fi when accessing patient or private data.
What is public Wi-Fi?
Just like washing your hands stops germs, this practice stops malware from spreading.
What is keeping systems updated (patching)?
This attack floods a website with too much traffic, making it unavailable to others.
What is a DDoS attack (Distributed Denial of Service)?
Using the same password across multiple accounts is called this risky habit.
What is password reuse?
This digital lawman monitors incoming and outgoing traffic to block bandits.
What is a firewall?
Before leaving the hospital, employees must ensure system access is ___.
What is removed or deactivated (offboarding)?
These cyber bandits don’t steal — they just cause chaos or make a point.
What are hackers or hacktivists?
These random, long strings of text stored in password managers are stronger than any human-made passwords.
What are generated passwords or random passphrases?
This symbol in your browser bar tells you a website is secure.
What is a padlock icon?
Complete the motto: “Be a cyber sheriff — protect the herd, protect the ___.”
What is patients (or hospital)?
When hackers demand payment in cryptocurrency to restore stolen files, it’s known as this.
What is a ransomware attack?
This method lets you sign in to accounts without passwords, often using fingerprints or security keys.
What is passwordless authentication or biometric login?