Facebook, X, Instagram, and Snapchat are all examples of this.
What is social media?
The method used by hackers via emails or messages that trick people into sharing private information.
What is phishing?
All tech devices should have one of these in order to help protect user information. These should not be shared with anyone. They should also be different for personal online accounts and business online accounts. They're typically recommended to be changed every 90 days.
What is a password?
This is a person who uses technology to gain unauthorized access to data.
What is a hacker?
These are the people responsible for the security of information within an organization.
Who is everyone in the organization?
Online offers that sound too good to be true are called ____. Some examples include: Get Rich Quick schemes, Nigerian Princes asking for money, provocative posts suggesting friends have been talking about you.. etc
What are scams?
Bad grammar, all words beginning with an upper-case letter, a link to click so that you can update your information, a conveyed sense of urgency, or a request for personal information are all examples of these.
What are things that may indicate a phishing email?
This is the term used to describe a strong password that uses a combination of numbers and letters.
What is an alphanumeric (password)?
Hackers make these computer programs so that the program may spread or self-replicate. The program requires user interaction to activate it. It will make your computer slow down or become unusable.
What is a virus?
The CIA triad is an acronym concerning three important concepts in regard to Cybersecurity.
What is Confidentiality, Integrity, & Availability?
The action of letting someone walk into a secure area behind you without a badge.
What is "tailgating" or "piggybacking"?
Fill in the blanks:
These are two important actions that you should take when you receive a phishing email.
Not click on any ____, and ____ the email.
What is to not click on any links, and report the email?
Whenever you leave your computer, even for a few minutes, you should perform this action.
What is (to) lock your computer?
These malware programs track where you go on the Internet and what you type into your keyboard.
What is spyware?
According to HIPPA, system rights are given to people on a ____-__-____ basis.
What is a need-to-know basis?
This is an action taken by hackers looking to steal identifiable information out of your garbage.
What is dumpster diving?
You can check the address of an embedded link using this procedure.
What is to hover your mouse/cursor over the link?
These items can be carried with you. When they're not properly password protected, that can result in a cyber security breach. This is especially true when the items belong to a company.
What are mobile devices, laptops, cell phones, and flash drives?
This type of malware prevents users from accessing their system by locking them out until the user pays the hacker for the key.
What is ransomware?
The action of watching (either in person or by using a recording device) what a user does on their computer by looking at the screen while standing behind the user.
What is shoulder surfing?
People are tricked into breaking security protocols or giving access to important information without realizing it. This may take the form of impersonation via telephone, in person, or email.
What is social engineering?
You should never provide any of these to a phishy email.
Correct answers include:
What are users IDs?
What are passwords?
What is sensitive information?
What is PII/PHI?
These are the first 8 characters you should see on a website address to make sure it is encrypted.
What is h-t-t-p-s-:-/-/?
OR
What is https://?
Strange computer behavior, keyboards not typing or mouses not clicking, computers crashing or restarting on their own, or programs running slower than usual are all potential symptoms of this.
What is a malware infection?
What is having been hacked?
This former subcontractor for the NSA stole a lot of confidential data and put it out into the world. They are likely the most famous example of an insider threat.
Who is Edward Snowden?