Scams
Types of Malware
Cyber 101
Best Practice
Keeper
100

An email that pretends to be from your bank and asks for your account details is an example of this type of attack.

What is a phishing scam?

100

This type of malware displays unwanted advertisements on your computer or device, often slowing down performance.

What is adware?

100

The practice of protecting computers, networks, and data from unauthorized access, theft, and damage.

What is cybersecurity?

100

This simple action can help keep your device secure when you are away from it by preventing unauthorized access.

What is locking your screen?

100

Keeper is used to securely store this type of information.

What are passwords?

200

This term describes a phishing attempt made via SMS.

What is smishing?

200

This type of malware monitors your computer activity and reports it to attackers, often without your knowledge.

What is spyware?

200

This type of software helps to prevent, detect, and remove malicious software from your computer.

What is antivirus software?

200

Always check for this in a website URL to ensure it is secure.

What is HTTPS?

200

To access your Keeper account, you need to enter this type of credential.

What is a master password?

300

If you suspect an email is a scam, you should select this button to report it to your email provider.

What is PAB it?

300

This type of malware attaches itself to files or system areas and replicates itself, potentially causing harm to your computer.

What is a virus?

300

The recommended browser for the internet.

What is Google Chrome?

300

Storing passwords in this manner, using a tool designed to manage and encrypt them, is a best practice.

What is Keeper?

300

When you create a new login entry in Keeper, this is the term used to refer to that specific saved item.

What is a Record?

400

This type of attack involves tricking the target into revealing sensitive information through fake emails.

What is spear phishing?

400

This self-replicating malware spreads across networks without requiring user action, often causing widespread damage.

What is a worm?

400

This type of malicious software is designed to block access to your computer system until money is paid.

What is ransomware?

400

When using public Wi-Fi, it’s a good idea to use this type of tool to secure your internet connection.

What is a VPN (Virtual Private Network)?

400

This feature monitors your passwords and alerts you if they have been compromised in known data breaches. 

What is BreachWatch?

500

This term refers to a type of cyber attack where an attacker overloads a system with traffic to make it unusable.

What is a denial of service (DoS) attack?

500

This type of malware disguises itself as legitimate software to trick users into installing it, thereby compromising their system.

What is a Trojan horse?

500

This practice involves keeping a copy of important information to protect against loss or corruption.

What is data backup?

500

This security practice enhances account protection by requiring additional verification beyond just your password.

What is two-factor authentication (2FA)?

500

This feature helps you manage and view the security of your passwords and whether any are weak or reused.

What is Security Audit or Password Health?