This 2013 breach of a large retailer compromised over 40 million credit cards.
Target
These are known as attack vectors in an email.
Link or Attachment
If you believe your computer is behaving suspiciously, this is the first thing you should do.
Report the incident to IT/Cybersecurity
An employee accidentally sending sensitive data to the wrong recipient is an example of this kind of insider threat.
Unintentional insider threat
Avoid installing mobile apps not from this source.
Official App Store
This 2017 ransomware spread globally using EternalBlue.
WannaCry
This kind of phishing targets specific individuals or groups.
Spear Phishing
Your files are encrypted, and a ransom is demanded to unencrypt them. What kind of attack is this?
Ransomware
This tool prevents employees from sending company data to a personal computer.
DLP (Data Loss Prevention)
Many mobile devices use this feature, which uses your face, finger, or other parts of your body to grant access.
Biometrics
The breach of this credit agency in 2017 affected over 140 million Americans.
Equifax
This phishing attack targets very high importance individuals such as C-Staff.
Whaling
You are starting to see a lot of pop-up ads across different sites you frequent that didn’t used to be there. What is the possible attack?
Adware
This term describes employees intentionally leaking data for revenge or profit.
Malicious Insider
The data on a mobile device should always be ____ in case it is lost or stolen.
Encrypted
This 2020 supply chain attack compromised U.S. federal agencies.
SolarWinds Orion Attack
These fake login pages are designing to steal credentials.
Credential Harvesters
This attack steals your data and exfiltrates it to collect information about you.
Spyware
Allowing employees to access only the tools and files they need for work is an example of ___.
Principles of Least Privilege
This control allows IT admins to control, secure, and enforce policies on company-owned smartphones, tablets, and other devices.
MDM (Mobile Device Management)
This notorious breach in 2017 involved exfiltration of tools from the NSA itself.
Shadow Brokers Leak
This technique of phishing via a phone call is called ___.
Vishing
Hackers often install this secret way to access your account or environment.
Backdoor
What percentage of insider threat incidents involve malicious intent? A: 15%, B: 28%, C: 55%, D: 83%
28%
This feature of many mobile devices is a great way to connect to the internet while avoiding connecting to unsecured networks on the go.
Mobile Hotspot