This type of authentication uses two or more factors, such as a password and a phone app.
What is multi-factor authentication?
This term describes a scammer doing phishing over voice calls.
What is vishing?
This technology allows computers to generate text, images, and even code that looks human-made.
What is generative AI?
If you see someone you do not recognize without one of these, you should report it to the physical security team.
What is an employee or visitor badge?
This is the record your browser keeps of the websites you’ve visited.
What is browser history?
This refers to a better version of a password, which involves the use of multiple words or a random sentence.
What is a passphrase?
Doing this before clicking on a link can help you identify where a link is taking you before you click on it.
What is "hover over" or "mouse over" the link?
We use this term to encourage responsible use of AI. It means that important decisions should keep real people involved.
What is human in the loop?
What is a shred bin? (Shredder, Secure Disposal Bin)
This tool can hide your IP address and help prevent interception of your computer communications while you are browsing online.
What is a VPN (Virtual Private Network)?
The most important factors in creating a strong password include password complexity, password uniqueness, and this.
What is password length?
This social network, founded by Reid Hoffman and Eric Ly, is the perfect place for hackers to get a list of people to target at your organization!
What is LinkedIn?
When an AI confidently gives you the wrong information, it's not lying -- it's doing this.
What is hallucination?
This is what the "s" in https:// stands for.
What is secure?
This recommended plugin for your web browser can help you keep track of your passwords at home and at work.
What is a password manager?
Also accepted: DashLane
Scammers will use emails, texts, or phone calls to make you feel this emotion, so that they can manipulate you into taking an action.
What is urgency (or anxiety/fear)?
Hackers are now using AI to write more convincing scam messages, making this traditional security threat even harder to detect.
What is phishing (or social engineering?)
This term describes spying on someone's screen or keyboard as they interact with sensitive information, and not just at the beach!
What is shoulder surfing?
This piece of data is sent to your browser by a web server to help it track you, making it less appetizing than it sounds.
What is a cookie?
This authentication method verifies something you are rather than something you know or have.
What is biometric authentication?
This advanced phishing technique can cause a message you didn't send to appear as though it came from your email address.
What is spoofing?
This cybersecurity impact term is used to describe what happens when you upload sensitive information into a public AI website.
What is a Data Loss Event? (Or Data Breach, Data Exposure)
When not referring to a game day hangout, this term describes the process of following someone into a locked area to avoid needing to scan a badge.
What is tailgating?
This hacker technique causes an overload in an internet service, causing it to crash, stall or stop working for its users.
What is a Denial of Service (DoS or DDoS) Attack?