This type of phishing uses text messages to lure victims.
What is SMS phishing?
DAILY DOUBLE!
This is the minimum recommended length for a strong password.
What is 12 characters?
The lock icon in the top left of the browser
What is HTTPS?
A simple but effective mnemonic to remember and use to avoid becoming the victim of fraudsters who urge immediate action.
What is S-T-O-P?
They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently, they only make up 17% of computer intrusions.
Who are hackers?
DAILY DOUBLE!
This is a common tactic used in phishing scams where attackers pretend to be a trusted source, like a bank or service provider.
What is impersonation?
This cryptographic technique transforms a plaintext password into a fixed-length string of characters, making it unreadable while still allowing verification against stored hashes.
What is hashing?
This network security device monitors and controls incoming and outgoing network traffic based on predetermined security rules.
What is a Firewall?
This is a good habit to develop, involving regular updates to your passwords.
What is changing passwords regularly?
These fake websites mimic legitimate ones to steal your login credentials.
What are phishing websites?
DAILY DOUBLE!
The use of personality, knowledge of human nature and social skills to steal passwords, keys tokens or other credentials to gain access to systems.
What is Social Engineering?
This is a phrase made up of random words strung together, often used to create a strong and memorable password.
What is a passphrase?
This process converts plain text or data into a coded form to prevent unauthorized access.
What is Data Encryption?
This commonly suggested practice discourages using personal information in passwords, but studies have shown that many users still incorporate this type of information, despite its vulnerability.
What is personal identifiable information (PII)?
In 2020, this popular social media platform suffered a significant hack involving phishing techniques, affecting high-profile accounts.
What is Twitter?
This is a social engineering phishing attack that intentionally deceives its recipient into scanning a QR code, redirecting the person to a bogus website.
What is quishing (QR phishing)?
This term refers to a database of previously leaked passwords, which attackers use to quickly compromise accounts with weak or reused passwords.
What is a password blacklist?
This feature on social media platforms allows users to control who can see their posts and personal information.
What are privacy controls?
DAILY DOUBLE!
Name the security mechanism that verifies the integrity and authenticity of digital messages or documents.
What is a Digital Signature?
This technique involves obscuring specific data within a database to protect sensitive information while maintaining its usability.
What is data masking?
This infamous phishing attack in 2013 targeted a major retailer, leading to the compromise of millions of customer credit card details.
What is the Target data breach?
This type of attack captures passwords by monitoring network traffic.
What is a packet sniffing attack?
DAILY DOUBLE!
This type of attack exploits users' tendency to reuse passwords across multiple sites, allowing attackers to gain unauthorized access
What is a credential stuffing attack?
This concept involves creating and implementing strict internal policies and protocols to ensure that employees handle sensitive data appropriately, minimizing the risk of breaches.
What is data governance?
This security feature alerts you when someone tries to access your account from an unrecognized device or location.
What are login alerts or security notifications?