Good work!
You have successfully completed the training
Take the next training program
Experience Points
Correct Answers:
Criminal Intention.
Verify before provide sensitive information.
Commonly target.
Do not provide co-workers contact or any type of information.
Methods use.
Delete the suspicious text, email or hang up the call.
Risk.
Do not provide any information.
Information leaked.
Take appropriate action based on type of information exposed.

Ransomware
Similar to malware, ransomware is used by attackers to extort money from the target individual or organization.

Phishing
Designed user to click on dangerous links — possibly divulging personal information, even financial information.

Spam
Cyber criminals can even embed password-stealing malware from a simple LinkedIn invitation.

Training
Our advance programs simulate most highlighted real world threat events. Improve your memory recall.
Why Security Awareness Training is important to every organization ?
Research suggests that most companies have unprotected data and poor cybersecurity practices in place, making them vulnerable to data-loss, data breaches, ransomware and more.
