Correct Answers:
Your Personal Information
Encrypt PI and save in to an external drive
Safely dispose digital PI
First run backup and factory data reset
Safely dispose paper PI
Purchase a shredder featured micro-cut
Free WIFI
Access to online backing via mobile data
PII
Verify before provide PII to third party
Information leaked?
Take appropriate action based on type of information exposed.

Ransomware
Similar to malware, ransomware is used by attackers to extort money from the target individual or organization.

Phishing
Designed user to click on dangerous links — possibly divulging personal information, even financial information.

Spam
Cyber criminals can even embed password-stealing malware from a simple LinkedIn invitation.

Training
Our advance programs simulate most highlighted real world threat events. Improve your memory recall.
Why Security Awareness Training is important to all organizations ?
Research suggests that most companies have unprotected data and poor cybersecurity practices in place, making them vulnerable to data-loss, data breaches, ransomware and more.