This is the practice of protecting systems, networks, and programs from digital attacks.
What is cybersecurity?
This type of insurance typically covers costs to an organization from a loss of sensitive data.
What is data breach?
This is the most common method attackers use to gain access to systems via email.
What is phishing?
This is the illegal act of accessing computers or networks without permission.
What is hacking?
This 2013 breach exposed data from over 3 billion user accounts.
What is the Yahoo breach?
This type of attack tricks users into revealing sensitive information by pretending to be a trustworthy source.(Commonly by email or text message.)
What is phishing?
This term refers to the process of evaluating a company’s cyber risk before issuing a policy.
What is underwriting?
What is the actual destination URL?
This crime involves using stolen identities to commit fraud online.
What is identity theft?
The massive breach experienced by a US retailer was traced back to their HVAC contractor as a point of entry.
Who is Target?
This security model assumes no user or device is trustworthy by default, even inside the network.
What is Zero Trust?
This clause in a cyber insurance policy may exclude coverage for attacks attributed to nation-states.
This type of email attachment should never be opened unless verified, due to malware risks.
What is a .exe file?
Type of software specifically designed to gain access to or damage a computer without the knowledge of the owner.
What is malware?
This 2017 breach exposed the sensitive data of 147 million Americans
What is the Equifax breach?
This term describes software that self-replicates and spreads without user interaction.
What is a worm?
This security practice of needing a code or physical token to verify identity before accessing a system is typically a requirement for most cyber insurance companies.
What is MFA (Multi-factor authentication)?
This email security measure encrypts messages to protect their contents.
What is end-to-end encryption?
This term describes coordinated attacks from multiple systems to overwhelm a target.
What is a DDoS (distributed denial of service) attack?
This 2020 supply chain attack compromised multiple U.S. government agencies.
What is the SolarWinds breach?
Beware of these types of programs that track every stroke you make while typing in an effort to glean your password.
What is, Keylogging
This insurance coverage pays for lost business income caused by an interruption of service from one of your critical vendors or systems.
What is dependent system failure?
This protocol helps verify that an email was sent from an authorized server.
What is SPF (Sender Policy Framework)?
A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless money is paid.
What is ransomware?
This 2014 breach leaked unreleased films and sensitive emails from a major studio, and was purportedly hacked by North Korea to prevent the release of the film "The Interview" which revolved around a plot to kill the country's leader Kim Jong-un
What is the Sony Pictures breach?