Attention March 13th, 2024 Webinar Attendees, please click here to complete our Survey or Attendance Verification and Credit Request Form. (required for CLE credit)

October is National Cybersecurity Awareness Month

Last update

at

by:

by:

Share

Print Friendly, PDF & Email
Take this Cybersecurity Awareness Jeopardy Quiz!

True or false: automatically updating your computer can pose a significant security concern, as it could install unwanted programs or features that may cause trouble.

False. Although updates can occasionally create glitches, they also contain vital patches to help protect your machine against attackers. Keep your machine up-to-date and install new patches as soon as possible. (Hint: don’t click “Remind me later” repeatedly).

Try this one: approximately how many attempted cyber attacks are reported to the Pentagon every day?

Answer: 10 million

October is National Cybersecurity Awareness Month. In recognition, the National Institute for Cybersecurity Careers and Studies has posted on online Jeopardy-style Trivia Quiz to test your cyber savvy. Below are some excerpts. See how well you do!

Take the full test here.

Want a wealth of resources and expertise to keep your firm cyber safe? Become a member of Alta Pro Lawyers RPG. You’ll get access to the Pro Practice Playbook, Reminger ProLink, Ask the Risk Pro, and free webinars – such as our upcoming one-hour CLE on email scams and social engineering. Here’s how to join.

National Cybersecurity Awareness Month Jeopardy Quiz
The quiz has five categories – Online Safety, Device Security, Types of Cyber Attacks, Cyber History and Cyber Stats – each with five questions in ascending order of difficulty. Here are some sample questions:

  1. Online Safety 100: You post a picture of you and your best friend to your favorite social media platform. She doesn’t feel comfortable with the image, so you agree to take it down. Will this ensure that no one else sees the picture? Answer: No. Once an image (or any information) is posted on the internet, it is virtually impossible to remove it from circulation. Taking it off your social media page will help, but there is no guarantee that others have not already seen it and/or downloaded it.
  2. Online Safety 500. What are good ways to help you keep track of all your different passwords? Answer: Use a password manager. These are apps, devices, or cloud services that store your passwords in an encrypted vault that can only be unlocked with a single master password. Use a “password pattern.” This is simply a pattern (recognizable only to you) that helps you remember your passwords.
  3. Device Security 300: True or False: cell phones, tablets and other mobile devices are not full computers and do not require software, such as anti-virus, to be secure. Answer: False. Almost all consumer devices, especially cell phones and tablets, are simply miniature computers. They contain important data (contacts, financial information, calendars) and require protection like any other device.
  4. Types of Cyber Attacks 100. A scammer creates a fake email and sends it to thousands of people, hoping some of them will click on a link and give up their personal information. What is this type of attack called?  Answer: Phishing. This is a type of social engineering that often manipulates human impulses, such as greed, fear, or the desire to help others. (Note: have you registered for our free CLE Social Engineering webinar coming up in December?)
  5. Types of Cyber Attacks 400. You bring your laptop to a local restaurant. Without your knowledge, the customer at the table behind you watches you log in to your email, thereby learning your username and password. What is this type of attack called? Answer: Shoulder surfing. It is important to remember that not all cyber attacks require the direct manipulation of technology. Attackers can often obtain important information by simply observing people, asking questions, or piecing together dissociated facts to learn or guess something private.
  6. Cyber History 400. This English writer and mathematician is known for her work on the Analytical Engine and is considered to be one of the first computer programmers. Answer: Ada Lovelace. She worked with Charles Babbage in the 1840s to publish the first computer-based algorithm.
  7. Cyber Stats 500. What is the estimated global cost of cybercrime by the end of 2019? Answer: $2 trillion USD.

Get protection and peace of mind with cyber liability insurance protection. Want a no-obligation quote on coverage to suit your practice needs? Contact Alta Pro Insurance today.

Share

Print Friendly, PDF & Email

Related Posts on Altaprorpg.com!

Alta Pro Logo Icon

About the Editorial Staff

In an age of consolidation where increasingly impersonal transactions have made customer service an oxymoron, we bring together independent agents, insurance companies, and other industry specific service providers to develop and deliver insurance products and risk management solutions that benefit our insurance customers.

May 22, 2024 1:00 pm EST
1.0 Regular Credit
June 12, 2024 1:00 pm EST
1.0 Ethics Credit

Join Our Newsletter

Occasional newsletters and CLE invites

Find Us on Social

Upcoming CLE Webinar: Essential Business Skills for Busy Lawyers Part 1 – Communicate Like A Pro

May 22, 2024 1:00 pm EST
CLE Credit: 1.0 Regular

Colleen L. Byers

Colleen Byers Mediation, LLC

Archives

Latest Videos

1 Hour

Creating an Attorney Compensation Plan That Will Build Firm Culture and Attract Top Talent

1 Hour

Ethical Uses of Generative AI in the Practice of Law

1 Hour

Four “Ds” of Client Relations: Dabbling, Documentation, Difficult Clients, Don’t Do it!

Need Help?

Visit our Frequently Asked Questions page. 

Or email us directly at info@altaprorpg.com

Or submit your issue in the comment form below and we will respond as soon as possible.