A security device that monitors and controls incoming and outgoing network traffic.
What is a firewall?
This is a common security breach that gives passive unauthorized access to controlled areas or company property.
What is "tailgating?"
The process of converting data on a mobile device into an unreadable format to protect it from unauthorized access.
What is mobile device encryption?
What is the weakest link in cybersecurity?
What is: People inside the organization?
Matthew Broderick plays a high-school aged computer whiz who accidentally accesses a military computer programmed to simulate... well, precisely what the title suggest.
What is WarGames (1983)?
Malicious software that disguises itself as a legitimate program.
What is a Trojan Horse
A security measure that restricts entry to authorized individuals.
What is Access Control?
A security measure that requires users to provide two different forms of identification to access a mobile device or app.
What is two-factor authentication?
The protection of personal information and ensuring that it is collected, used and stored securely and in accordance with applicable laws and regulations.
What is Data Privacy?
Sandra Bullock stars as a systems analyst who works remotely in California and becomes embroiled in a deadly conspiracy after receiving a mysterious floppy disk that backdoors in to a well-known computer security system.
What is The Net (1995)?
A cyber attack where attackers impersonate a trustworthy entity to trick individuals into revealing sensitive information.
What is Phishing?
The term for trained personnel responsible for monitoring and protecting a facility or property.
What are security guards?
The process of creating a copy of data on a mobile device to protect against data loss or device failure.
What is mobile device backup?
A combination of uppercase and lowercase letters, numbers, and special characters at least 16 characters long.
What is a strong password?
This film depicts a dystopian future in which humanity is unknowingly trapped inside a simulated reality that intelligent machines have created to distract humans while using their bodies as an energy source.
What is The Matrix (1999)?
The term for the practice of regularly updating software and systems to protect against unknown vulnerabilities.
What is patching?
A security method that uses unique physical or behavioral characteristics for identification.
What is Biometric Authentication?
Technology that creates a secure connection between a mobile device and a private network, protecting data transmission.
What is a mobile device VPN?
What is the most common type of cyberattack that targets employees?
Phishing is the most common type of cyberattack targeting employees, where attackers send fraudulent emails to trick recipients into revealing sensitive information or clicking on malicious links.
A young Angelina Jolie as "Acid Burn" stars in this energetic romp thriller pitting a band of school-aged hackers against a corporate extortionist seeking a big payday.
What is Hackers (1995)?
The collective network of connected devices and the technology that facilitates communication between devices and the cloud, as well as the devices themselves.
What is IoT, or Internet of Things?
Physical barriers or measures designed to prevent unauthorized access to a facility.
What is a Perimeter Security?
The term for the practice of managing and securing mobile mobile devices within an organization.
What is Mobile Device Management (MDM)?
Information that can be directly or indirectly linked to an individual’s identity (e.g. Financial, Identity, Relationships, etc.) are especially sensitive because if it is disclosed or compromised without authorization, presents an increased security risk to the individual.
What is Personally Identifiable Information (PII)?
This film is a fictionalized account of the founding and fallout of WikiLeaks and showcases how information security (or lack thereof) can be easily manipulated for personal or political gain.
What is The Fifth Estate (2013)?