Cybersecurity
Cyber Insurance
Email Security Best Practices
Cyber Crimes
Famous Cyber Breaches
100

This is the practice of protecting systems, networks, and programs from digital attacks.

What is cybersecurity?

100

This type of insurance typically covers costs to an organization from a loss of sensitive data.

What is data breach?

100

This is the most common method attackers use to gain access to systems via email.

What is phishing?

100

This is the illegal act of accessing computers or networks without permission.

What is hacking?

100

This 2013 breach exposed data from over 3 billion user accounts. 

What is the Yahoo breach?

200

This type of attack tricks users into revealing sensitive information by pretending to be a trustworthy source.(Commonly by email or text message.)

What is phishing?

200

This term refers to the process of evaluating a company’s cyber risk before issuing a policy.

What is underwriting?

200
What can you reveal by hovering over a link in an email?

What is the actual destination URL?

200

This crime involves using stolen identities to commit fraud online.

What is identity theft?

200

The massive breach experienced by a US retailer was traced back to their HVAC contractor as a point of entry.

Who is Target?

300

This security model assumes no user or device is trustworthy by default, even inside the network.

What is Zero Trust?

300

This clause in a cyber insurance policy may exclude coverage for attacks attributed to nation-states.

What is a war exclusion?
300

This type of email attachment should never be opened unless verified, due to malware risks.

What is a .exe file?

300

Type of software specifically designed to gain access to or damage a computer without the knowledge of the owner.

What is malware?

300

This 2017 breach exposed the sensitive data of 147 million Americans

What is the Equifax breach?

400

This term describes software that self-replicates and spreads without user interaction.

What is a worm?

400

This security practice of needing a code or physical token to verify identity before accessing a system is typically a requirement for most cyber insurance companies.

What is MFA (Multi-factor authentication)?

400

This email security measure encrypts messages to protect their contents.

What is end-to-end encryption?

400

This term describes coordinated attacks from multiple systems to overwhelm a target.

What is a DDoS (distributed denial of service) attack?

400

This 2020 supply chain attack compromised multiple U.S. government agencies.

What is the SolarWinds breach?

500

Beware of these types of programs that track every stroke you make while typing in an effort to glean your password. 

What is, Keylogging

500

This insurance coverage pays for lost business income caused by an interruption of service from one of your critical vendors or systems.

What is dependent system failure?

500

This protocol helps verify that an email was sent from an authorized server.

What is SPF (Sender Policy Framework)?

500

A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless money is paid.

What is ransomware?

500

This 2014 breach leaked unreleased films and sensitive emails from a major studio, and was purportedly hacked by North Korea to prevent the release of the film "The Interview" which revolved around a plot to kill the country's leader Kim Jong-un

What is the Sony Pictures breach?