This method of verification uses something you know and something you have.
What is multi-factor authentication?
This term describes the process of moving company data to online servers.
What is Cloud Migration?
"Internet" and "etiquette" describes good behavior on the web.
What is Netiquette?
This movie's plot revolves around a computer virus named "WOPR" that nearly starts World War III.
What is "WarGames"?
This is the practice of making copies of data so that these additional copies may be used to restore the original after a data loss event.
What is Data Backup?
This type of attack involves tricking you into revealing your personal information.
What is Phishing?
BYOD stands for a policy allowing employees to use their personal devices for work.
What is Bring Your Own Device?
Describing something to someone who as though they know nothing about computers.
What is Techsplaining?
This animated series features a tech-savvy dog named Brain and his owner, who often find themselves in technological misadventures.
What is "Inspector Gadget"?
This strategy involves having duplicate systems in different physical locations.
What is Redundancy?
This is a cyberattack where hackers demand payment to restore access to data.
What is Ransomware?
This business model allows software to be used on a subscription basis.
What is Software as a Service (SaaS)?
Or Cloud Computing?
"Spying" and "software," describing software that secretly monitors your computer activities.
What is Spyware?
This film features a character named Thomas Anderson, who learns about the real world after being recruited by hackers.
What is "The Matrix"?
This term describes a plan to keep business operations running during a disaster.
What is Business Continuity Planning?
This practice keeps your software up-to-date to protect against known vulnerabilities.
What is patching?
This acronym stands for an approach where IT services are handled by a third party.
What is Managed Service Provider (MSP)?
"Voice" and "over" and "internet" and "protocol" describes making phone calls via the internet.
What is VoIP?
In this movie, a group of hackers aim to steal money from a bank's computer system, led by a character named Cosmo.
What is "Sneakers"?
This tech ensures your company's data is safe even if one server goes down; it's all about redundancy.
What is Failover?
This security measure checks if you are human by asking you to click on images or solve puzzles.
What is CAPTCHA?
(Completely Automated Public Turing test to tell Computers and Humans Apart)
This term refers to the process of combining different systems and software to work together seamlessly.
What is integration?
A portmanteau description of portmanteau itself.
What is "Frankenword"?
This sci-fi series explores the consequences of artificial intelligence, with episodes centered around technology and privacy.
What is "Black Mirror"?
In disaster recovery, this is a fully operational off-site data processing facility that can take over immediately if the primary site fails.
What is a Hot Site?