Correct Answers:
Criminal Intention
Verify before provide sensitive information.
Commonly target
Do not provide co-workers contact or any type of information.
Methods use
Delete the suspicious text, email or hang up the call.
Risk
Do not provide any information.
Information leaked
Take appropriate action based on type of information exposed.

Ransomware
Similar to malware, ransomware is used by attackers to extort money from the target individual or organization.

Phishing
Designed user to click on dangerous links — possibly divulging personal information, even financial information.

Spam
Cyber criminals can even embed password-stealing malware from a simple LinkedIn invitation.

Training
Our advance programs simulate most highlighted real world threat events. Improve your memory recall.
Why security awareness training is important to all organizations?
Research suggests that most companies have unprotected data and poor cybersecurity practices in place, making them vulnerable to data-loss, data breaches, ransomware and more.