What is the term for malicious software that demands payment to unlock your files?
What is ransomware?
DROPSASW
What is PASSWORDS?
What's it called when someone tricks you into giving up confidential information?
What is Social Engineering?
Managing and updating Out of date software, applications, and operating systems that can have vulnerabilities
What is Patch Management?
A term referring to the use of security measures to protect physical assets, personnel, and facilities. What is it?
What is Physical Security?
What should you look for in the browser address bar to ensure a site is secure?
What is a padlock icon or "https"?
HISNPHIG
What is PHISHING?
A scammer calls pretending to be IT and asks for your login. What type of attack is this called?
What is vishing?
A model that allows attackers with minimal hacking skills to access advanced phishing tools
What is Phishing as a Service (PhaaS)?
A device that records visual footage for security purposes, often used in conjunction with intrusion detection systems.
What are Security Cameras?
What should you avoid doing on public WIFI without a VPN?
What is accessing sensitive or financial information?
TFMUIALTNIAOTCAEH
What is a MULTI-FACTOR AUTHENTICATION?
What's a good practice before sharing sensitive info over the phone?
What is verifying the caller's identity?
A type of scam involving a two-dimensional barcode that stores data in a grid of black and white squares, allowing smartphones and cameras to quickly scan and access information.
What are QR Code scams?
A device that uses an employee's unique biological characteristics to verify their identity. What is it?
What types of websites should you avoid entering personal information on?
What are unsecured (non-HTTPS) websites?
MERAOSWNAR
What is RANSOMWARE?
What is someone watching over your shoulder to steal information?
What is shoulder surfing?
A type of cyberattack against AI systems where malicious instructions are hidden in normal-looking text or data
What is Prompt Injection?
A physical security measure that restricts access to certain areas of a building based on employee role or need-to-know.
What is Access Control?
What type of pop-up might tell you your computer is infected and try to get you to install software?
What is scareware or a fake virus alert?
LIGTANGITE
What is TAILGATING?
A scammer texts you pretending to be a VP in your company. What's this technique called?
What is smishing or executive impersonation?
A type of cybersecurity threat that often exhibit sophisticated techniques such as dynamic behavior, fileless attacks and delayed execution to avoid detection and evade traditional security measures.
What are HEAT (Highly Evasive and Adaptive Threats) Attacks?
A technique where a person enters a building or area by following someone who is authorized to enter.
What is Tailgaiting?