What's a simple way to protect your data in case hackers successfully encrypt your files?
What is Backup your data
It's an attempt to scam the user into surrendering private information that will be used for identity theft via over the phone.
What is Vishing?
What is Phishing
What is an attempt to trick a user into sharing personal or sensitive information
Ideally, what characters should you use in a password to make it strong?
What is All of them
I spy with my little eye....Something that uses personality, knowledge of human nature and social skills to steal passwords, keys tokens or other credentials to gain access to systems.
What am I?
What is Social Engineering
What is Personally Identifiable Information (PII)?
What is Any combination of your name, your home address or phone number, credit card or account numbers or social security number
What are the two major means phishing was done through?
Email phishing
text phishing
What percent of users are unable to recognize a phishing email.
33%, 50%, 72% or 97%
What is 97%
Who is it safe to reveal your password to?
What is........
I spy with my little eye...Another word for Tailgating
What is Piggybacking
If using a windows-based PC, you do this to quickly lock your computer before stepping away.
What is Press the Windows key and the letter L
(Ctrl+Alt+Del and select "Lock this Computer" also would be correct.)
It occurs when a cyber criminal sends a text or SMS message to another individual requesting their personal information
What is Smishing
What Percentage of data breaches in 2021 involved phishing attacks?
36%, 55%, 71%, or 92%
What is 36%
Where should you write down your passwords?
What is Never write them down
I spy with my little eye.... Someone Watching (either in person or using a recording device) what you do on your computer by looking at a reflection of or the actual screen of your computer or mobile device.
Who am I?
What is Shoulder Surfing
** Double Jeopardy** Your best protection against cyber-attacks is to T.H.I.N.K. What does T.H.I.N.K stand for?
What is
T-Think before you click on links & attachments.
H-Hover over links to see their destination.
I-Install only approved software.
N-Never ignore warning signs.
K-Keep operating systems up-to-date.
What can be used to inject malicious code, redirect you to phishing websites, or give a hacker access to your computer?
What is USB Baiting?
What was the most impersonated brand used in phishing attacks throughout Q4 of 2020
Google, Apple, Microsoft, or Amazon
What is Microsoft?
** Double Jeopardy** If you receive any suspicious email, where should you report it to?
What is Support Email
I spy with my little eye... Someone who causes 30-50% of all data loss within an organization.
Who am I?
What is Insider Threat
What are the things you could do to secure your Personal Information?
What is
Check your privacy settings frequently.
Make sure to update the programs or apps you are using to Personal information.
Don’t post any personal information that could be used to access accounts.
Always think before you click
Lastly make sure you have MFA turned ON!
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
What is Social Engineering
What percent of businesses reported being a victim of a phishing attacks?
71%, 73%, 74%, or 76%
What is 76%
Why is Multi-factor Authentication (MFA) important?
What is Multi-factor Authentication is important, as it makes stealing your information harder for the average criminal.
** Double Jeopardy** I spy with my little eye....an email asking for Personally Identifiable Information (PII).
Who am I?
What is Phishing