This security practice involves categorizing data based on its sensitivity and importance to the organization, allowing for appropriate protection measures to be implemented.
What is data classification?
This 2016 attack exposed the personal information of over 500 million users of this internet company.
What is the Yahoo breach?
If you receive an email that looks "phishy", this add-in sends it to be investigated.
What is the "Report Phishing" button?
This process involves simulating cyberattacks on a system to identify and fix security vulnerabilities before real attackers can exploit them.
What is penetration testing?
This authentication protocol allows users to securely access multiple applications or services using a single set of credentials, often through integration with identity providers.
What is Single Sign-On (SSO)?
The process of systematically destroying or scrubbing personal data that is no longer needed, to protect privacy.
What is (data) sanitization?
This former National Security Agency (NSA) contractor leaked classified documents revealing extensive government surveillance programs to the media in 2013.
Who is Edward Snowden?
This technology automatically identifies and blocks unsolicited or unwanted emails from reaching a user's inbox, reducing the risk of exposure to malicious content.
What is spam filtering (or detection)?
This security measure requires users to provide multiple forms of identification to verify their identity.
What is Multifactor Authentication?
This security practice involves regularly reviewing and updating user permissions and access rights to ensure they align with organizational policies and least privilege principles.
What is access control management?
This practice involves tracking who accesses data, when, and what actions they perform, often used in auditing and compliance.
What is logging?
DAILY DOUBLE!
This infamous cyber attack, initiated through a phishing email, led to the exposure of sensitive diplomatic cables and caused international embarrassment for the United States.
This type of intelligence provides organizations with timely and relevant information about emerging email security threats, enabling proactive defense measures and incident response.
What is threat intelligence?
This tool helps organizations prevent the unauthorized disclosure or leakage of sensitive data by monitoring, detecting, and blocking the transmission of sensitive information across networks and endpoints.
What is data loss prevention solution (DLP)?
This technology ensures that email messages are signed with a digital signature to verify the sender's identity and ensure the message's integrity.
What is DKIM (DomainKeys Identified Mail)?
This concept ensures that data remains unchanged during storage, transmission, and retrieval, preventing unauthorized modification.
What is data integrity?
This 2017 cyber attack targeted a credit company, compromising the personal information of over 147 million individuals.
What is Equifax?
This inbox is monitored by the Security Operations Center to investigate any suspicious emails.
What is phishing@dominos.com?
This type of software is specifically designed to detect, prevent, and take action to disarm or remove malicious software.
What is Antivirus Software?
DAILY DOUBLE!
This type of authentication involves confirming a user's identity based on unique physical characteristics, such as fingerprints, facial features, or iris patterns.
This technique involves masking or obfuscating data, especially sensitive information, to prevent unauthorized access while still allowing it to be processed or analyzed.
What is anonymization or redaction?
In 2021, this major U.S.-based pipeline operator fell victim to a ransomware attack, leading to temporary shutdowns and fuel shortages along the East Coast.
What is the Colonial Pipeline Ransomware attack?
This practice involves regularly updating email software to protect against newly discovered vulnerabilities.
What is patch management?
This tool monitors and controls incoming and outgoing network traffic based on predetermined security rules to prevent unauthorized access and protect against cyber attacks.
What is a firewall?
This protocol is widely used for secure, federated identity management, allowing users to authenticate with one system and gain access to others without re-entering credentials.
What is SAML?