Phishing
Ransomware
Cyber Syntax
Business Email Compromise
100

The most common method of cyber phishing

What is email?

100

This type of malware encrypts files and demands money for their return.

What is ransomware?

100

The process of converting data into a coded format to prevent unauthorized access.  

What is Encryption?

100

The most commonly targeted departments by this type of cyberattack.

What are the finance and accounting departments?

200

Outsiders gaining access to data systems, breach of PHI and payment data, business email compromise

What are the consequences of phishing?

200

One of the best defenses against ransomware attacks. It involves regularly saving copies of important data.

What are data backups?

200

A security process that requires two different forms of identification to access a system or account, typically a password plus a secondary code.

What is two-factor authentication?

200

About $4 billion

How much was lost due to business email compromise scams last year?

300

Suspicious links, unexpected attachments, or requests for sensitive information.

What are red flags in phishing emails?

300

A common 'currency' demanded in Cyber Ransom events.

What is Bitcoin?

300

A service that encrypts your internet connection and routes it through a remote server, providing privacy and security, especially when using public networks

What is a VPN?

300

A secondary communication channel

What is a phone call or other follow up communication to verify authenticity?

400

Check the sender's address, verify its authenticity and think carefully

What should you do before forwarding any email?

400

The average ransom demand in corporate attacks was about this amount in 2023.

What is $1 million?

400

This type of attack overwhelms a network with traffic to make services unavailable.

What is a Distributed Denial of Service (DDoS) attack?

400

"Urgent payment request," "Immediate wire transfer needed," or "Change in payment details."

Common Subject Lines in Business Compromise Emails

500

What is spear-phishing?

This targeted phishing attack uses personal information to make it more convincing.

500

This term describes ransomware attacks where hackers both encrypt files and threaten to leak data.

What is double extortion?

500

A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

What is a Firewall?

500

A cyber attacker can do this to obscure the true sender of an email.

What is Spoofing?