This was developed back in the 1960s by the US Department of Defense and is now the largest global system of interconnected computer networks.
The Internet
When should you provide personal information to a person or company that doesn't need to know it.
NEVER
The minimum recommended character count for a password or passphrase.
14+
This social media giant is the largest and was founded by Mark Zuckerberg.
A computer program used to prevent, detect, and remove computer viruses and malware.
Antivirus or antimalware software
WWW
World Wide Web
By connecting to your personal ____________, if available, is much safer than connecting to a guest WiFi network such as a coffee shop, airport, or hotel.
Cell phone or hot spot
A sentence or "phrase" that is used for a password.
Passphrase
An American microblogging and social networking service on which users post and interact with messages known as "Tweets".
By restoring a ______________ is the easiest and single best way to recover from a ransomware attack that encrypted all your personal data
Backup
A computer or mobile device is more likely to be compromised (hacked) when connected to a ___________.
Network
You just found out that you were victim of an online scam, it is in your best interest to contact your local _______________ and then report it to the company that may be involved.
law enforcement agency (Police or Sheriff)
A type of service or platform that securely stores all your passwords and sensitive information in one place.
Password vault or Password Manager
Posting on social media that you are going on a vacation or trip is a sure way to have your home _____________.
Vandalized or broken into
By performing this function, you ensure that your personal data will no longer be on the device before you trade-in or recycle.
Restore to factory defaults or wiping
A person who is usually an expert with technical knowledge that maliciously infiltrates a computer to steal data.
Everyone leaves a digital footprint. It is recommended to have this plan along side your will so your loved ones know what to do with you data and accounts when you pass away.
Digital Inheritance Plan
What should you never do with a password that is already used or especially compromised?
Reuse it or recycle it
You should _____________ an online account if you no longer use it or it's been inactive for many years.
close or delete
By performing regular _______________ with your computer/mobile device, you are protecting your device's Operating System and applications from being exploited.
Software updates or patching
This famous Internet company started in 1989 that provided basic Internet Access and coined the phrase "You Got Mail".
AOL (America Online)
Which wireless (WiFi) network RF (Radio Frequency) would be best used when wanting to access your network/Internet from far distances, like your back yard, but may not be as fast?
2.4GHz
These three types of characters should be used to make up a password's complexity which creates a strong password.
Letters, Number, and Special Characters
By adjusting your ______________ settings, you can help protect who views your personal content on all social media platforms.
privacy or security
The second best thing to a strong password is to enable what?
MFA (Multi-factor Authentication) or 2 Factor Authentication