This best practice describes using a different password for every account.
What is password diversification, what is not repeating passwords?
This scam uses emails pretending to be from reputable companies to trick you into giving away personal information.
What is phishing?
This is something you should avoid doing on public Wi-Fi.
What is accessing sensitive information?
This is a cyberattack where secure information is shared or stolen by unauthorized parties.
What is a data breach?
This is what you should do if you see any links in an email you weren’t expecting.
What is, don’t click them!
This is the minimum number of characters you should have in a secure password.
What is, 8 characters?
This is a scam where someone pretends to be a from trusted company in a phone call.
What is vishing?
This is a program that helps protect your computer from bad software.
What is antivirus?
This is a malicious program that presents itself as a legitimate software.
What is a trojan horse?
This is what you should do if you see any attached files in an email that you are not expecting.
What is, don’t download them!
This kind of password contains numbers, symbols, uppercase and lowercase letters.
What is a complex password?
The term for when a scammer pretends to be a reputable company in a text message.
What is smishing?
These are programs or files that self-replicate and spread to other computers.
What is a virus?
This is when an attacker locks your files and demands payment to unlock them.
What is ransomware?
Doing this when you see an email that looks like it is from someone you know is a good way to check if it is legitimate.
What is calling them, what is verifying out-of-band?
This is a helpful tool that can generate and remember passwords so you don't have to.
What is a password manager?
This is a type of scam where the attacker pretends to be an employee or a trusted insider to gain access to sensitive data.
What is pretexting, what is impersonation?
This is a sign that a website is safe to use.
What is a padlock in the address bar, what is HTTPS?
This is when a hacker tries to stop a website from working by overwhelming it.
What is denial of service, what is DOS, what is DDOS?
This is what you should do if you receive an email that you suspect to be a phishing attempt.
What is use the Phish Alert Button?
This is a way hackers try to get into your account by guessing all possible passwords.
What is brute force?
This type of scam is when an attacker uses personalized emails with to target specific individuals or businesses.
What is spear phishing?
This is a way to secure your accounts even if the attacker has your password.
\What is MFA, what is 2FA, what is multifactor?
This is an attack in which a malicious actor intercepts communication between two individuals in order to steal data.
What is man in the middle, what is eavesdropping?
What should you do if you have concerns about a file, link, or software?
What is contact IT?