The motivation behind the majority of data breaches.
What is Money?
DOSARWSP
What is Password?
Name given to Emails from un-known senders.
What is SPAM?
The illegal acquisition and use of someone else’s personal information to obtain money or credit.
What is Identity theft?
Information NOT to include when creating online passwords.
What what is: easily related information about you - Birthdays, Home address, Childs name etc?
Unwanted email that is sent to a large number of recipients.
What is SPAM?
ECYBR TYEURICS
What is Cyber Security?
The Outlook email client has a button used to report this type of unwanted email.
What is Suspicious?
When criminals attempt to collect on a fraudulent debt.
What is Debt Collection scam?
When posting to social media, this type of information should be limited.
What is Personal Information?
Term for a program with something malicious hidden inside.
What is Trojan ?
RVYBIUNLEAITL
What is Vulnerability?
An example of this type of email is, you received an email message stating that you are a winner and need to claim your prize.
What is Phishing (Scam)?
Will any of these entities email you to verify your personal information:
A: Your Bank
B: Integer
C: IRS
What is NO?
I should check this at least once a year as a part of my normal precaution again Identity theft.
What is my credit report?
Integer associates use this to remotely access the corporate network from home.
What is VPN?
TTINEDYI TEHTF
What is Identity theft?
Should you share 'any' personal information requested by your bank via email.
What is No?
A program that can help protect your computer from malware and virus email attachments.
What is Anti Virus Software?
When web surfing, I should see this in my browser address bar when the site is secured by an HTTPS certificate.
What is the "lock" icon?
When using your browser to 'surf' the Internet, in the address bar, this letter is used after 'http' and assures you that you are securely communicating with a website.
What is 'S'?
LIOSCLA EIADM
What is SOCIAL MEDIA?
This type of access-denial attack can be delivered via email as an attachment and may encrypt files making them inaccessible.
What is a Ransomware Attack?
This type of email attack, uses email to collect personal and financial information or infect your machine with malware and viruses. .
What is a Phishing attack?
Method used to verify your access to things like secure banking information like the use of a one-time code texted to a mobile device.
What is multi-factor authentication?