Secured under your keyboard
What is the worst place for your password?
Join to increase Cyber awareness
What is Join Cybermasters!
Good hackers and bad hackers
What are the two type of hackers?
Fake ADs and secret shopper requests
What are phishing emails with malware links
National Cyber Security Alliance
What is NCSA
123456, 123456789, abc@123 and QWERTY
What are the most common passwords?
Common malware, enters computer unnoticed, not a condom.
What is Trojan virus
Electronics connected to the internet
What are items most vulnerable to hacking?
Great causes, too good to be true
What are phony Help Me ads?
Oh No! Someone is using my private identity.
What is Identity Theft
my e0Rk eyet 1Z #1
What is My York IT is Number 1.
Use of dedicated websites and applications, interact with users.
What is social networking
Pay the ransom, or wipe your computer clean
What is a Ransomware
Free iPhone. Free Computer. Act Now!
What are pop-up Ads with fake coupons?
0% unemployment rate
What is Cybersecurity industry?
7H15 EyeT 6Roup 1Z 4Maz1Ng!
What is, This IT Group is Amazing!
Verify me on cell phone, email or text
What is Multifactor Verification?
Cyber Attacks
Fastest growing crime in United States
Activity of online account holder posing as a legitimate company
What is phishing
It spreads, but not like butter, and self-replicates after user activates.
What is a virus?
Every 90 days
What are good password resetting time frames?
Tracks sites you visit, what you do on your computer.
What is Spyware
10 Trillion
What are the cybercrime cost estimated by the year 2025?
Extra copies of computer files, can restore files that are lost or damaged.
What is Backing Up Files?
Programs that can block, detect, and remove viruses and other malware.
What is Antivirus software?