This is the practice of protecting computers, servers, networks and data from unauthorized access.
What is Cybersecurity?
This security feature makes you prove who you are twice.
What is multi-factor authentication (MFA)?
People who use technology to commit malicious activities, breaking into systems, stealing data and often think wearing a hoodie makes them look mysterious.
What is a Cybercriminal?
This technique might involve a fake Brad Pitt sending an email asking for money.
What is Phishing?
This is the international standard for Information Security Management Systems.
What is ISO 27001?
The story follows Neo, a hacker who discovers that the world he knows is a simulated reality controlled by machines.
What is "The Matrix"?
When you bring your phone or computer to work and Security cries a little on the inside.
What is BYOD (Bring Your Own "Disaster")?
Like the Holy Trinity of Security, these three factors prove you are who you say you are —because just knowing a password is not enough anymore.
What is something you know, something you have, and something you are?
This hacktivist group took down government websites and defaced others as part of their infamous attacks in 2012, often with the tagline "We Are Legion".
Who is "Anonymous"?
This is the practice of using clever tricks to manipulate people into revealing confidential information.
What is Social Engineering?
These 4 classification labels help you decide if your data is out in the open, office-only, locked in a vault, or buried in a bunker.
What are Public Use, Internal Use, Confidential and Secret?
The comedic misadventures of Roy, Moss and their supervisor Jen, a team of IT support workers at a large corporation.
What is "The IT Crowd"?
This term describes a weakness in a system that can be exploited.
What is a Vulnerability?
This type of malware locks users out of their files and demands payment.
What is Ransomware?
This organization, led by Julian Assange, sparked global debate on government transparency, privacy, and national security.
What is Wikileaks?
If you get a text from "Netflix" saying your account is locked, but you don’t even have Netflix, it’s called this.
What is Smishing?
This regulation protects the privacy of individuals within the European Union.
What is GDPR (General Data Protection Regulation)?
A whistleblower leaks classified information about NSA's illegal surveillance techniques in this 2016 biographical film.
What is "Snowden"?
This is the process of converting data into an unreadable format unless you have the proper key.
What is Encryption?
A malicious threat to an organization that comes from people within the organization, who have inside information concerning the security practices, data and computer systems.
What is a insider threat?
(watch "The Inside Man" available in KnowBe4)
He was one of the most famous American hackers, crackers and phreakers in history. His nickname was Condor. He also nicknamed him "Ghost in the Wires".
Who was Kevin Mitnick?
This type of attack targets specific individuals, often using personalized information to appear legitimate.
What is Spear Phishing?
This is the set of Trust Service Criteria used to evaluate how a company manages sensitive data in cloud services, ensuring it’s kept safe and secure.
What is SOC2?
Elliot, a brilliant but troubled hacker, becomes a key figure in a in a complex game of global chaos when he and his shadowy allies try to take down the corrupt corporation his company is paid to protect.
What is "Mr. Robot"?
This person is responsible for ensuring that your company's security is not compromised.
Who is EVERYONE?
This phrase means that data can only be accessed by the right person, at the right time, for the right purpose.
What is the principle of least privilege?
In 2017, this ransomware attack spread globally, demanding Bitcoin from victims. It disrupted critical services, including healthcare, and highlighted the importance of timely software updates.
What is WannaCry?
This is the technique of gathering publicly available information about a target through their social media or other online platforms.
What is open-source intelligence (OSINT)?
CIA are the three core principles of information security: ensuring that data is kept private, accurate, and be there when you need it.
What are Confidentiality, Integrity, and Availability?
A programmer is selected to participate in a experiment in synthetic intelligence by evaluating the human qualities of a highly advanced humanoid AI. It explores security vulnerabilities that malicious AI could exploit.
What is "Ex-Machina"?