Cyber attackers commonly use this electronic communication method to lure victims
What is email?
This term describes the physical components of a computer
What is hardware?
This major social media platform experienced a data breach in 2019, leading to the exposure of millions of user's personal information
What is Facebook?
You receive an email claiming to be from your bank, asking you to click a link and verify your account information. What type of cyber attack is this?
What is phishing?
According to recent studies, what percentage of respondents cited being distracted as the top reason for failing phishing tests?
5%
15%
30%
45%
What is 45%?
What percentage of cyber attacks start with an email?
20%
45%
75%
92%
What is 75%?
This type of software helps to protect your computer from viruses and other malicious attacks
What is antivirus?
This online marketplace was the target of a major data breach in 2014, exposing the usernames and passwords of millions of users
What is eBay?
You receive a text saying that your account has been compromised and you need to reset your password by clicking a link, but it is a trap. What type of cyber attack is this?
What is a SMS phishing attack (Smishing)
Approximately how often do cyber attacks occur? One every:
39 seconds
1.5 minutes
2 hours
2.1 hours
What is 39 seconds?
Which global brand is the most impersonated in phishing emails?
What is Microsoft?
This term refers to the practice of using social interaction to trick people into revealing personal information
What is social engineering?
Which decade was the first malware created?
What is the 1970s?
Your friend tells you they clicked a link in an email and now their computer is asking for money to unlock files. What type of cyber attack is this?
What is ransomware?
What was the total cost of cyber crime in 2023?
20 Million
750 Million
4 Billion
8 Trillion
What is 8 Trillion?
Clicking on links in phishing emails can lead to this type of malicious software being installed on your device
What is malware?
This common security practice requires users to provide two forms of identification before accessing an account
What is two-factor authentication?
In 2013, this major retailer experienced a data breach where millions of credit and debit card numbers were stolen during the holiday shopping season
What is Target?
Your internet connection suddenly slows down because someone from a single system is flooding your network with excessive traffic, making it unusable. What type of cyber attack is this?
What is a Denial of Service (DoS) attack
Approximately what percentage of attacks on insurance companies result in compromised client details?
37%
60%
75%
84%
What is 75%?
This term is used to describe an attack that targets specific users
What is spear phishing?
This programming language is known for its readability and is often used for web development, data analysis, and artificial intelligence
What is python?
Which decade was the first antivirus created?
What is the 1980s?
After clicking a link disguised as a legitimate program, your device starts acting strangely and slows down significantly, performing unwanted actions. What kind of cyber attack may have occurred?
What is a Trojan Horse attack?
According to recent studies, this percentage of data breaches is caused by human error
11%
28%
62%
88%
What is 88%?