This type of malware disguises itself as legitimate software but performs harmful activities once installed
What is a Trojan horse?
This type of phishing targets high-level executives within an organization.
What is whaling?
This term refers to the act of using someone else's personal information without their consent, often for fraudulent purposes.
What is identity theft?
This is the first action you should take if you suspect your identity has been stolen
What is to gather evidence of the identity theft?
This year marks the founding of the American College of Cardiology.
What is 1949?
This malicious software encrypts files on a victim's computer, demanding payment for the decryption key
What is ransomware?
This type of phishing involves phone calls where the attacker pretends to be from a reputable company to gather personal information
What is vishing (voice phishing)?
To protect your online identity, you should use a unique password for each account. This type of password is known as what?
What is a strong password?
After gathering evidence, you should do this with your financial institutions to protect your accounts.
What is to notify your banks and credit card companies?
The ACC publishes this peer-reviewed journal, which is one of the most respected in the field of cardiology.
What is the Journal of the American College of Cardiology (JACC)?
This type of malware replicates itself to spread to other computers and networks
What is a worm?
Before clicking a link in an email, you should do this to see where it leads
What is hover your mouse over the link?
Using this tool can help you create and store complex passwords securely.
What is a password manager?
Filing this report with local authorities can help document the identity theft and may be necessary for further action.
What is a police report?
The ACC has a dedicated program to educate healthcare professionals about the importance of managing this chronic condition, which is a major risk factor for heart disease.
What is hypertension?
This type of malware that attaches itself to legitimate programs or files. It replicates and spreads to other systems when the infected file is shared or executed
What is a virus?
This term refers to the act of impersonating a legitimate source in order to gain unauthorized access or information.
What is spoofing?
Sharing personal information on social media can make you vulnerable to this type of cyber threat.
What is social engineering?
Contacting this agency allows you to place a fraud alert on your credit report and monitor for any suspicious activity.
What is a credit bureau (Experian, TransUnion, or Equifax)?
The heart is commonly recognized as a symbol of this important concept.
What is Love and Affection, Compassion, Kindness Passion, Desire, Life and Vitality Health, Wellness
This malware that secretly monitors and collects information about a user’s activities without their knowledge, often used to steal sensitive data like passwords or credit card information.
What is Spyware?
This type of phishing occurs through text messages instead of emails
What is smishing?
When setting up an online account, this method adds an extra layer of security by requiring a second form of verification.
What is two-factor authentication (2FA)?
This federal agency provides resources and assistance for victims of identity theft
What is the Federal Trade Commission (FTC)?
In what year was the first ACC meeting that occurred in New York.
What is 1951?