Make sure you have this feature turned on so that after a period of inactivity the screen is automatically locked.
What is Auto-lock or Screen-lock?
This modern method of remote communication using a webcam allows people to interact through audio and visual means.
What is a Video Conferencing?
This type of currency is often demanded by cybercriminals in exchange for restoring access to encrypted files
What is cryptocurrency?
The most common communication method used at OPG. Threat actors often try to hack or impersonate someone through this median
What is an Email?
This mobile security feature allows you to remotely locate, wipe or lock your device if it's lost or stolen. .
What is Find My Device?
Most home network devices are pre-configured with _____ administrator passwords to simplify setup.
What is default?
This is one of the most effective ways to prevent data loss in case of a ransomware infection.
What is backup files/redundancy?
Often used for sensitive documents, physically destroys printed pages to prevent unauthorized viewing
What is Shredding?
This feature on mobile devices allows users to unlock their device using their face.
What is facial recognition?
This is a common term for annoying and unnecessary software pre-loaded on many computers and phones.
What is Bloatware?
Ransomware's nasty trick: it can do this to your files, making them inaccessible.
What is encryption?
A fraudulent email pretending to be from your bank and asking for your login information is a classic example of what kind of simple cyberattack?
What is Phishing?
This feature allows you to use a PIN or password in addition to biometric authentication for an extra layer of security.
What is Windows Hello/Authentication?
Commonly called as a network name, is a sequence of characters that uniquely names a Wi-Fi network.
What is SSID (Service Set Identifier)?
This term refers to the process by which ransomware operators use a compromised system to spread malware to other systems on the same network.
What is Lateral Movement?
This feature ensures your document will only be printed when you’re physically at the printer and have authenticated yourself.
What is Secure Print?
This type of mobile security threat involves a malicious app disguising itself as a legitimate app to trick users into installing it.
What is a Trojan horse
This type of security feature can detect and block unauthorized devices from joining your home network.
What is MAC Address Filtering?
If your computer is encrypted with ransomware, this is the first thing you should do.
Isolate from Network and Call Helpdesk
This term refers to artificial intelligence technology that can create convincing pictures or video hoaxes
What is Deepfake Technology?