Password Strength
Hacker Protection
Phish or Legit
Cyber Myths
Uh Oh What Now
100

Derived from the use of a ruler

Length

100

In 2025, how much do stolen credentials cost on criminal markets? A) $1 B) $10 C) $100 D) $1000

What is B - just $10? (Some hackers offer subscription packages for $81/week!)

100

An email says 'URGENT: Your account will be closed in 24 hours unless you click here!' What red flag is this?

What is urgency/pressure? (Or: What is 'trying to make you panic so you don't think'?) Legitimate requests can wait for verification. Scams cannot.

100

True or False: 'If I use incognito/private browsing mode, I'm completely anonymous online.'

What is FALSE? Incognito only stops your local browser from saving history - your ISP, websites, and network admin can still see you

100

You just clicked a suspicious link. What should you do FIRST? A) Panic B) Throw computer out window C) Disconnect from network D) Both A and B


What is C - disconnect from network (then report it to IT immediately)?


200

True or False: Writing down your passwords is ALWAYS a terrible security practice.


What is FALSE? A Microsoft security expert famously said if you have 68 passwords and can't write them down, you'll just reuse the same one everywhere - which is worse! - a locked drawer at home is safer than the same password on 68 sites!

200

What percentage of data breaches involve compromised Customer PII according to the 2024 report?  

What is 48%
200

You hover over a link that says 'www.service.nsw.gov.au' but it shows 'www.servlce.nsw.gove.au'. What's this trick called?

What is typosquatting? (Or URL spoofing)

 Attackers swap letters that look similar: 'rn' looks like 'm', '1' looks like 'l'. Always hover before you click!

200

True or False: 'Antivirus software catches all malware, so I'm 100% protected.'


What is FALSE? Antivirus is important but not foolproof . New malware is created faster than signatures can update!


200

You notice someone following behind you into a secure building. What's the cybersecurity term for this, and what should you do?


What is piggybacking/tailgating? You should politely ask them to use their own card or alert security

300

One password to access many services

Single Sign On (SSO)

300

What was the McDonalds 2025 chatbot data breach a result of?

What is? Poor password strength
300

An email from your 'CEO' asks you to urgently buy gift cards. The email address is correct but something feels off. What should you do?

What is verify through another channel (call them, Teams message, walk to their office)?  Even real email accounts get hacked!

300

Myth: 'Only clicking on things downloads files to my computer.' What's the reality?

What is FALSE - drive-by downloads can happen just by visiting compromised websites without clicking anything

300

A colleague fell for a phishing email and is embarrassed. How should they be treated? A) Public shaming B) Firing C) Learning opportunity D) Immediate promotion


What is C - learning opportunity? (Though D would be nice for honesty!)


400

Using another device to authenticate your login attempt

Multi Factor Authentication (MFA) or 2FA

400

What is the term used when attackers compromise lower-level employees?

What is Island Hopping or Lateral Movement? Attacked use small fish access to then move laterally throughout the network eventually reaching their real target the executives

400

What's the term for highly targeted phishing attacks aimed at specific individuals using personal info from social media?

What is spear phishing? (Or whaling if targeting executives)

400

Complete this myth: 'I don't need to worry about cybersecurity because I'm not _____ enough to be targeted.'


What is 'important'? (The myth is that only VIPs get targeted - WRONG! Hackers use automated attacks on everyone!)

400

You find a USB stick in the parking lot labeled 'Executive Salaries 2025'. What do you do?


What is DO NOT plug it in - report it to IT/security?

 This is called 'baiting'. In security tests, 45% of people plug in random USB drives. It could install malware instantly!


500
A pair of digital keys that acts like a lock system

Passkeys (Private + Public)

500

You get an email that passes all technical checks (correct domain, no typos, professional formatting) but your gut says something's wrong. Should you trust that feeling?

What is YES - trust your gut and verify?

500

You suspect customer PII has been exposed in a breach. Name THREE types of people/teams you need to notify immediately.

What is: IT/Security team (CS Connect), your manager, Privacy Officer, and potentially affected customers (depending on severity)?

Cyber Threat Detection and Response Team (63637676 Opt 1 then Opt 4)

 NSW Government has legal obligations to notify affected individuals and regulators. Quick reporting = quicker containment!