We're All Human
Types of Threats
Cyber Business
The Keys to the Castle
Don't Get Hooked
Just the Fact
100

This is the percentage of data breaches that a study from IBM attributes to human error

What is 95%?


100

Technology used to send emails that appear to come from a trusted user 

What is email spoofing?

 

100

This is the cybercrime business model where ransomware operators write software and affiliates pay to launch attacks using said software. Affiliates do not need to have technical skills of their own but rely on the technical skills of the operators

What is Ransomware as a Service (RaaS)?


100

Four things all passwords should include.

What are Upper case, lower case, number, special characters?

Password phrases are much more difficult to compromise; ex. "I graduated in 2001"=!Gi2001 OR !Gradi2001

100

A text message like this one is designed to get PII (Personally identifiable information) from the recipient


What is a smishing scam?


100

These industries were the top 3 targets of cyber security events in 2022

What are health care, financial services and retail

200

What are 3 things you do not share online?

What are your...

1. Password

3. Address

3. Phone number

4. Birthdate

5. Social Security Number


200

This manipulation technique exploits human error to gain private information, access to restricted systems, or valuable data.

What is social engineering?

200

These modern convenience items make daily life easier for the user but also for cyber criminals, due to the fact that their default settings are frequently left unchanged.

What are the Internet of Things (IoT)?


200

A password attack that tries every possible combination of letters and numbers

What is Brute Force?


200

In the email pictured here, this piece of information indicates that this email is suspicious.

What is the sender email address, obtained by hovering over what appears to be a legitimate sender.

200

The demands in this type of cyber incident increased 144% in 2021

What is ransomware?


300

The activity you are currently engaged in is one of the best ways to minimize the element of human error in cyber crime.

What is Security Awareness Training?



300

This major wireless communications provider disclosed in January that a hacker had accessed a trove of personal data for 37 million of the company's customers. A bad actor apparently had access to customer data from November 25, 2022, until the company discovered the intrusion on January 5, 2023. The stolen data includes a customer's name, billing address, email, phone number, date of birth, account number and information such as the number of lines on the account and plan features.

Who is T-Mobile?

300

This popular family of productivity software has seen an dramatic increase in malware attacks due to it's popularity and misconception that developer provides adequate anti-viral/anti-malware security.

What is Microsoft 365?

300

This is the process of requiring a second form of identification to log into a system, after providing a valid password.  Often this is a physical attribute (fingerprint or face id) or one-time passcode sent via separate application or text.

What is Multi-factor or 2-Factor authentication?


300

A claim that there is a "problem" with your account, or a request to "verify your identity", update personal information such as password, credit card, social security or bank account numbers like the one shown here


What are examples of a phishing email?


300

This percentage of a company's data is usually recovered after a ransomware attack

What is 65%?


400

The policy of limiting employee access to files, based on job function, is call this and is a highly effective way to minimize vulnerability of sensitive data. 

What is Selective Access or Zero-Trust policy?


400

The increase in the remote workforce caused a spike in cyber threats due in part to a lack of this policy in many companies

What is a BYOD policy?


400

This type of threat appears to be from a trusted source such as a supervisor, can take the form of fraudulent wire transfer directions, bogus invoices, attorney impersonation, bank account misdirection, or socially engineer emails such the one shown here

Business Email Compromise?


400

To initiate this attack, the hacker tries a long list of common words, together with numbers before or after them like people often use.

What is a Dictionary Attack?

400

This type of phishing campaign targets C-suite executives 

What is "whaling"?


400

This cost an average of $4.35M in 2022.

What is a data breach?

Up to $5.1 M when the majority of the workforce is remote.

500

This type of phishing attack targets specific individuals by exploiting information gathered through research on such platforms as social media accounts?

What is spear phishing? 

Answers to security questions and passwords can also be obtained.

500

Erratic computer behavior, lack of response to keyboard or mouse commands, crashing or restarting on its own, or running slower than usual are potential symptoms of this

What is a malware infection?

 

500

These can be organized crime syndicates, a nation state, a business competitor or a disgruntled employee

Who are threat actors?


500

This is the term given to the process of fixing code that proves to be a vulnerability in software.  Many developers release these fixes on an on-going basis, and the service of Remote Monitoring and Maintenance that DCNC provides helps keep your systems up to date.

What is patch management?



500

This is what you should do if you receive an email notification like the one pictured below.

What is delete it, and report it to 

https://www.cisa.gov/be-cyber-smart/report-incident


500

According to the Cybersecurity and Infrastructure Security Agency, this is the number of cybersecurity attacks reported to the Pentagon every day

What is over 300,000?