This type of software is designed to harm or exploit devices.
What is malware?
A strong password should include a mix of these three types of characters.
What are letters, numbers, and symbols?
Adjusting these on social media can help control who sees your information.
What are privacy settings?
This is a common sign of a phishing email.
What is urgent language and a suspicious link?
This practice involves keeping your software up to date.
What is regular software updates?
This scam involves tricking individuals into giving away personal information.
What is phishing?
This practice involves using a different password for each online account.
What is using unique passwords?
This type of audit involves reviewing and adjusting your privacy settings.
What is a privacy settings audit?
This action should be taken if you receive a phishing email.
What is report it as spam?
This type of network should be avoided for sensitive transactions like online banking.
What is public Wi-Fi?
This type of attack involves sending fraudulent emails to steal personal information.
What is a phishing attack?
This method adds an extra layer of security by requiring two forms of identification.
What is two-factor authentication?
This setting can prevent strangers from seeing your posts on social media.
What is setting your profile to private?
This type of phishing targets specific individuals or organizations.
What is spear phishing?
This practice involves not sharing your passwords with others.
What is password confidentiality?
This term describes unwanted software that can slow down your computer and steal information.
What is spyware?
This type of password should be avoided because it is easy to guess.
What is a simple password (e.g., "password" or "123456")?
This feature can help you control who can tag you in photos and posts.
What is tag review?
This term describes a fake website designed to steal your information.
What is a phishing site?
This feature can help protect your accounts by requiring a second form of identification.
What is two-factor authentication?
This type of online threat involves locking users out of their systems until a ransom is paid.
What is ransomware?
This tool can help you manage and store multiple strong passwords securely.
What is a password manager?
Regularly updating these can help protect your personal information.
What are privacy settings?
This practice involves verifying the sender's email address before clicking on links.
What is email verification?
This practice involves being cautious about the information you share online.
What is mindful sharing?