MFA is short for this security measure; would you like that code sent via Email or Text?
What is Multi-Factor Authentication
Cybercriminals doing this are "angling" to get confidential info from you like credit card numbers
What is Phishing
It's the term for malicious software that holds data "hostage" until a payment is made--or until Mel Gibson gets it back for you
What is Ransomware
This is a qualitative or quantitative estimate of potential impact from a threat or hazard related to a recognized vulnerability
What is a risk assessment
Coined in 2017 this term refers to the re-creation of a person's appearance or voice through artificial intelligence
What is Deepfake
From a word for "hidden", it's the process of making digital data unreadable to the unauthorized
What is Encryption
This type of phishing attack is directed at specific individuals using personal and company information gathered from social media
What is Spear phishing
Beware of these types of programs that track every stroke you make while typing in an effort to glean your password
What is Keylogging
Something every organization must have in place to properly respond to a cyber incident
What is an incident response plan
An incorrect or fabricated response from a large language model or AI chatbot
What is AI hallucination
Those inscrutable letter combos and pesky login puzzles. Two examples of these tools, which discern real users from bots
What is CAPTCHA
This type of phishing attack – or is it a mammalian attack? – targets high profile individuals in an organization
What is Whaling
In this cybercrime business model one criminal gang sells code or malware to other hackers, who then use it to carry out cyberattacks
What is Ransomware as a Service (RaaS)
This NIST information security policy framework helps private sector organizations improve their ability to prevent, detect, and respond to cyber-attacks
What is the NIST Cybersecurity Framework (CSF)
This popular chatty large language model (LLM) enables cybercriminals to easily write malicious code
What is ChatGPT
In real life, it can slow the spread of flames and smoke; in your digital life, it blocks unauthorized access to your private data
What is a Firewall
This type of social engineering attack (phish) uses the phone to gain personal and financial information
What is Vishing
This type of previously unknown software vulnerability gives hackers a window of opportunity to exploit systems before developers can create and distribute a patch
What is a zero-day vulnerability
An organization may choose to offset costs associated with cyber related incidents by transferring risk through this method
What is cyber insurance
This industry was the most frequently targeted by cybercriminals in 2023, outpacing healthcare, government, and critical infrastructure
What is the finance industry
Companies consider cybersecurity when instructing employees with a policy on BYOD, short for this
What is Bring Your Own Device
This type of attack sends a SMS text message attempting to steal critical information or to install malware on the device
What is Smishing
Ethical hackers, also called by this headgear, use their skills to identify security risks
What is White-hat
This type of email attack, targeting both businesses and individuals, resulted in adjusted losses of over $2.9b in 2023
What is Business Email Compromise (BEC)
Losses related to this financial scam were the highest of any crime type in 2023, seeing a 38% increase in just one year
What is investment scams