Cybersecurity is the practice of protecting this from attacks.
What are systems, networks, and data?
A fake HR email asking you to to click a link is an example of this.
What is phishing?
Ransomware does this to files.
What is lock or encrypt them?
Before leaving for the day, you should do this to protect your workstation.
What is lock your computer?
Using unauthorized apps or tools for work is known as this.
What is Shadow IT?
Most cyber incidents start with this type of everyday action.
What is clicking a link or opening an email?
Phishing attacks usually try to create this feeling.
What is urgency?
Attackers demand this to restore access.
What is payment (a ransom)?
Before clicking a link, you should always do this.
What is pause and check?
You should avoid putting sensitive company data into public this.
What is AI tools or chatbots?
Cybersecurity is not just the responsibility of IT - it is shared by these individuals.
Who are all employees (everyone)?
Text-message phishing is called this.
What is smishing?
Ransomware often begins with this type of communication.
What is a phishing email?
You should never share this with anyone.
What is your password?
Protecting personal and company information is part of this concept.
What is privacy awareness?
Employees are considered this line of defense.
What is the first line of defense?
Phone-call scams pretending to be IT are called this.
What is vishing?
Clicking a malicious attachment can lead to this type of attack.
What is ransomware infection?
If something looks suspicious, employees should do this immediately.
What is report it to IT/Systems Dept.?
Even helpful technology must be used responsibly to avoid this.
What is data exposure or risk?
Cyber attacks often rely on human behavior rather than this.
What is advanced hacking?
If you're unsure about a message, the safest action is to do this.
What is report it?
Good awareness can stop ransomware before it does this.
What is spread across the company/network?
Using the same password across sites increases this type risk.
What is a data breach risk?
Only approved tools should be used to store or share this.
What is company data?