Password Nightmares
What Could Go Wrong?
Disaster Dodging
Network Ninjas
IT Regrets
100

Requires two forms of verification such as password + phone code.

What is multi-factor authentication?

100

Clicking a fake email that asks for your login credentials.

What is phishing?

100

Creating copies of data to protect against loss.

What is a data backup?

100

A private connection that encrypts your online traffic.

What is a VPN (Virtual Private Network)?

100

Running outdated Windows or Office versions without security updates.

What is unpatched software?

200

Passwords like “123456” or “password” are examples of this.

What are weak passwords?

200

Malware that encrypts files and demands payment for decryption.

What is ransomware?

200

The process of restoring systems and files after a failure.

What is data recovery?

200

Automatically assigns IP addresses to devices on a network.

What is DHCP?

200

Logging into sensitive accounts on a personal laptop without company protection.

What is using unsecured devices?

300

Policy that forces users to change passwords every 90 days.

What is password expiration?

300

Someone in marketing uploads sensitive client data to an unapproved cloud service.

What is shadow IT?

300

A backup that only saves changes since the last full backup.

What is an incremental backup?

300

Translates human-readable domain names to IP addresses.

What is DNS?

300

Malware that locks systems, often demanding money.

What is ransomware?

400

A tool that securely stores and generates complex passwords.

What is a password manager?

400

A temporary contractor has full admin access to critical servers.

What is overprivileged access?

400

Keeping backup copies in a different location to protect against local disasters.

What are offsite backups?

400

Dividing a network into zones to limit breaches spreading.

What is network segmentation?

400

Not reviewing user permissions periodically.

What is failing access audits?

500

Principle of giving users only the access they need.

What is the principle of least privilege?

500

Accessing the company network from public Wi-Fi without protection.

What is connecting without a VPN?

500

A documented plan to restore critical operations after a major outage.

What is a disaster recovery plan?

500

Protects web traffic from being intercepted on the internet.

What is HTTPS?

500

Employees reusing the same password across multiple accounts.

What is password reuse?

M
e
n
u