Settings
Language
Color Theme
Cybersecurity for lawyers
For lawyers, cybersecurity is about protecting sensitive information from cyber threats while ensuring compliance with legal obligations. Legal work is built on trust, confidentiality, and precision. Cybercriminals attempt to exploit each of these.
Why lawyers are targeted
Lawyers handle confidential documents, regulatory matters, litigation strategy, financial transactions, and sensitive negotiations. If a lawyer has their digital identity or account compromised, highly sensitive information can be exposed.
Which of the following BEST explains why lawyers are targeted by cybercriminals?
Loading...
View Options Again
Legal teams rarely use digital systems.
Lawyers handle highly sensitive information.
Legal communications are not time sensitive.
Legal work does not involve financial risk.
Where cyberattacks often start
Cyberattacks rarely appear suspicious at first. They masquerade as formal notices, urgent filings, documents, or links to websites that look legitimate and demand immediate attention.
Verify, don't assume
Logos, names, and formal language can be replicated easily. A message can appear official while still being fraudulent. The source of a message should always be verified.
You receive an email claiming to be from a regulator with the correct case number and a link to download documents. What should you do first?
Loading...
View Options Again
Verify the sender using a known official channel before accessing anything.
Open the link to avoid missing the deadline.
Phone a friend.
Reply asking the sender to confirm their legitimacy.
Urgency does not build trust
Deadlines create pressure, but they do not remove the obligation to confirm the authenticity of a request. Cybercriminals rely on urgency to reduce scrutiny and bypass standard procedures.
Cybercriminals often use multiple communication channels
Cybercriminals may use email, phone calls, texts, or meeting invites to make a request feel credible. Just because you've been contacted over multiple communication channels doesn't mean the other party is who they say they are.
You get an urgent email from an unknown address claiming to be a client. Shortly after, you get a call from the client who demands immediate action. What should you do?
Loading...
View Options Again
Ask the caller to resend the link and proceed.
Verify the request using a known contact point or communication channel before taking action.
Act quickly since both email and phone confirm the request.
Rely on the urgency and respond immediately.
Your role carries authority
Cybercriminals may attempt to masquerade as you in an attempt to have a client, colleague, supplier, or partner perform an adverse action. If you’re ever asked to validate the authenticity of a message sent by you, don’t take offense; it’s good cybersecurity hygiene.
Which scenario BEST reflects an impersonation attempt?
Loading...
View Options Again
A confirmed vendor invoice processed normally
An expected email from a colleague at an unknown email address
A routine internal calendar invite
An expected email from a colleague at a known email address
What cybercriminals want
Cybercriminals ultimately want you to perform an adverse action. This could be inadvertently providing them with your account credentials, opening a malicious document, or sending a payment, to name a few. To achieve this goal, phishing websites are commonly used. Let’s explore phishing websites further.
Phishing websites can be highly convincing
Phishing websites can be highly deceptive and designed to look and feel exactly like the real thing. It’s important to always look at the domain of the website and check that it matches what’s expected. Wherever possible, avoid clicking links inside emails, and instead use a bookmarked link or one taken from a trusted location.
How to spot phishing websites
The most effective method for spotting a phishing website is to analyze the URL and specifically look for the primary domain and determine if it matches what’s expected. For example,
attacker.com
is the primary domain inside the following URL:
https://microsoft.attacker.com/security?query=valid
Is the following statement True or False:
The most effective method for spotting a phishing website is to look at the primary domain and determine if it matches what’s expected.
Loading...
View Options Again
True
False
Your account is your digital identity
Beyond being able to spot phishing websites, it’s important to protect your digital identity by following good cyber security hygiene practices. Let’s explore this in more detail.
Protecting your devices
To protect your devices, you should: Keep your computer up to date with security patches. Use strong, unique passwords for all of your accounts. Use multi-factor authentication. Last but not least, keep antivirus software up-to-date.
Which of the following is NOT a way to protect your devices?
Loading...
View Options Again
Keep your computer up to date with security patches.
Always use strong, unique passwords.
Install antivirus software.
Avoid using multi-factor authentication because it slows you down.
Protecting your data
To protect your data from cybercriminals, you should:
Encrypt your data
Back up your data
Use unique passwords
It's good to encrypt your data because it adds an extra layer of protection against cybercriminals. Encryption is a method of encoding data so that it can only be accessed by someone with the proper decryption key. This means that even if your data falls into the wrong hands, it will be much harder for an attacker to access it.
It's good to back up your data because it provides a way to restore your data in the event of a cyberattack, hardware failure, or other data loss event. By regularly backing up your data, you can ensure that you have a copy of your important files and information that you can access in the event of a disaster.
It's good to use unique passwords when securing data because it helps make it more difficult for an attacker to gain access to all of your accounts and data. Even if an attacker finds your password in a breach or password dump, they will only have limited access to your online identity.
What's the BEST method to protect your data from cyber attacks?
Loading...
View Options Again
Regularly back up any sensitive data and store the backup in a secure location.
Encrypt sensitive data with a password you use across all your accounts so you won't forget it.
Stay away from the internet and computers in general.
Use an aluminum apparatus to protect the wearer's head from anomalous transmissions.
Wrapping Up
By following the practices outlined in this training, you can keep your clients safe and your reputation spotless.
Back
Next
Translation Correction
×
Select a translation to correct...
Begin the Guided Tour
[0, "Begin the Guided Tour", "Begin the Guided Tour"],
Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.
[1, "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.", "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action."],
Compose
[2, "Compose", "Compose"],
Folders
[3, "Folders", "Folders"],
Inbox
[4, "Inbox", "Inbox"],
Starred
[5, "Starred", "Starred"],
Draft
[6, "Draft", "Draft"],
Sent Mail
[7, "Sent Mail", "Sent Mail"],
Spam
[8, "Spam", "Spam"],
Trash
[9, "Trash", "Trash"],
[URGENT] Claim Your Work From Home Set-Up Payment
[10, "[URGENT] Claim Your Work From Home Set-Up Payment", "[URGENT] Claim Your Work From Home Set-Up Payment"],
Human Resources
[11, "Human Resources", "Human Resources"],
to
[12, "to", "to"],
Claim Your Work From Home Set-Up Payment
[13, "Claim Your Work From Home Set-Up Payment", "Claim Your Work From Home Set-Up Payment"],
Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of
[14, "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of", "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of"],
to ensure that you have a suitable home working set-up.
[15, "to ensure that you have a suitable home working set-up.", "to ensure that you have a suitable home working set-up."],
To receive the payment via payroll
[16, "To receive the payment via payroll", "To receive the payment via payroll"],
you will need to complete this
[17, "you will need to complete this", "you will need to complete this"],
acknowledgement form
[18, "acknowledgement form", "acknowledgement form"],
For more information on how to set up your home office space safely, please look at the
[19, "For more information on how to set up your home office space safely, please look at the", "For more information on how to set up your home office space safely, please look at the"],
Thank you
[20, "Thank you", "Thank you"],
The Human Resources Team
[21, "The Human Resources Team", "The Human Resources Team"],
This is an automatically generated email, please do not reply
[22, "This is an automatically generated email, please do not reply", "This is an automatically generated email, please do not reply"],
Is the following statement True or False
[23, "Is the following statement True or False", "Is the following statement True or False"],
View Options Again
[24, "View Options Again", "View Options Again"],
Email Subject: Urgent Action
[25, "Email Subject: Urgent Action", "Email Subject: Urgent Action"],
Phishing attacks are designed to put a
[26, "Phishing attacks are designed to put a", "Phishing attacks are designed to put a"],
time pressure on us to act fast
[27, "time pressure on us to act fast", "time pressure on us to act fast"],
This can cause us to skip much of the critical thinking we normally apply when browsing our emails
[28, "This can cause us to skip much of the critical thinking we normally apply when browsing our emails", "This can cause us to skip much of the critical thinking we normally apply when browsing our emails"],
Email Sender: Fradulent Address
[29, "Email Sender: Fradulent Address", "Email Sender: Fradulent Address"],
Email Sender: Fraudulent Address
[30, "Email Sender: Fraudulent Address", "Email Sender: Fraudulent Address"],
Attackers will often use
[31, "Attackers will often use", "Attackers will often use"],
obscure email addresses and use display names
[32, "obscure email addresses and use display names", "obscure email addresses and use display names"],
that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information
[33, "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information", "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information"],
Email Content: Engaging Topic
[34, "Email Content: Engaging Topic", "Email Content: Engaging Topic"],
Attackers often use a
[35, "Attackers often use a", "Attackers often use a"],
broad but important topic
[36, "broad but important topic", "broad but important topic"],
to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.
[37, "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.", "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes."],
Email Link: Phishing Website
[38, "Email Link: Phishing Website", "Email Link: Phishing Website"],
hovering over the link
[39, "hovering over the link", "hovering over the link"],
you'll see the true link location. Often this is enough to see the malicious intent.
[40, "you'll see the true link location. Often this is enough to see the malicious intent.", "you'll see the true link location. Often this is enough to see the malicious intent."],
Wrapping up
[41, "Wrapping up", "Wrapping up"],
If you
[42, "If you", "If you"],
spot anything suspicious
[43, "spot anything suspicious", "spot anything suspicious"],
with the email sender, subject, content, links or attachments
[44, "with the email sender, subject, content, links or attachments", "with the email sender, subject, content, links or attachments"],
Don't take the risk. Report the email to your IT or Security team for review.
[45, "Don't take the risk. Report the email to your IT or Security team for review.", "Don't take the risk. Report the email to your IT or Security team for review."],
Submit
[46, "Submit", "Submit"],
Next
[47, "Next", "Next"],
Back
[48, "Back", "Back"],
Malicious links will often appear with innocent looking text. By
[49, "Malicious links will often appear with innocent looking text. By", "Malicious links will often appear with innocent looking text. By"],
Correct!
[50, "Correct!", "Correct!"],
Incorrect
[51, "Incorrect", "Incorrect"],
True
[52, "True", "True"],
False
[53, "False", "False"],
Change language
[54, "Change language", "Change language"],
Current Language
[55, "Current Language", "Current Language"],
Use Browser Settings
[56, "Use Browser Settings", "Use Browser Settings"],
Select a language
[57, "Select a language", "Select a language"],
Change Language
[58, "Change Language", "Change Language"],
Please select a language
[59, "Please select a language", "Please select a language"],
Language
[60, "Language", "Language"],
Color Theme
[61, "Color Theme", "Color Theme"],
Color Theme And Background Selector
[62, "Color Theme And Background Selector", "Color Theme And Background Selector"],
Colorful Theme
[63, "Colorful Theme", "Colorful Theme"],
Select Theme
[64, "Select Theme", "Select Theme"],
Close
[65, "Close", "Close"],
Dark Theme
[66, "Dark Theme", "Dark Theme"],
Green Theme
[67, "Green Theme", "Green Theme"],
Purple Theme
[68, "Purple Theme", "Purple Theme"],
Light Theme
[69, "Light Theme", "Light Theme"],
Blue Theme
[70, "Blue Theme", "Blue Theme"],
Settings
[71, "Settings", "Settings"],
Theme Selected
[72, "Theme Selected", "Theme Selected"],
This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!
[73, "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!", "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!"],
Translation Correction
[74, "Translation Correction", "Translation Correction"],
Select a translation to correct...
[75, "Select a translation to correct...", "Select a translation to correct..."],
Original Text
[76, "Original Text", "Original Text"],
Correct Translation
[77, "Correct Translation", "Correct Translation"],
Translation to correct...
[78, "Translation to correct...", "Translation to correct..."],
Submissions are reviewed and applied within 48 hours.
[79, "Submissions are reviewed and applied within 48 hours.", "Submissions are reviewed and applied within 48 hours."],
Submit Correction
[80, "Submit Correction", "Submit Correction"],
Submission Successfully Sent
[81, "Submission Successfully Sent", "Submission Successfully Sent"],
Submission Error - Please Try Again
[82, "Submission Error - Please Try Again", "Submission Error - Please Try Again"],
Submission Sending...
[83, "Submission Sending...", "Submission Sending..."],
Mandatory Viewing
[84, "Mandatory Viewing", "Mandatory Viewing"],
Please watch the video from beginning to end before proceeding.
[85, "Please watch the video from beginning to end before proceeding.", "Please watch the video from beginning to end before proceeding."],
Ok
[86, "Ok", "Ok"],
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.
[87, "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.", "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant."],
Language translation for this training module has been disabled and explicitly set to the following language
[88, "Language translation for this training module has been disabled and explicitly set to the following language", "Language translation for this training module has been disabled and explicitly set to the following language"],
I acknowledge
[89, "I acknowledge", "I acknowledge"],
Thank you for providing an acknowledgement
[90, "Thank you for providing an acknowledgement", "Thank you for providing an acknowledgement"],
Cybersecurity-For-Lawyers
[91, "Cybersecurity-For-Lawyers", "Cybersecurity-For-Lawyers"],
Cybersecurity for lawyers
[92, "Cybersecurity for lawyers", "Cybersecurity for lawyers"],
For lawyers, cybersecurity is about protecting sensitive information from cyber threats while ensuring compliance with legal obligations. Legal work is built on trust, confidentiality, and precision. Cybercriminals attempt to exploit each of these.
[93, "For lawyers, cybersecurity is about protecting sensitive information from cyber threats while ensuring compliance with legal obligations. Legal work is built on trust, confidentiality, and precision. Cybercriminals attempt to exploit each of these.", "For lawyers, cybersecurity is about protecting sensitive information from cyber threats while ensuring compliance with legal obligations. Legal work is built on trust, confidentiality, and precision. Cybercriminals attempt to exploit each of these."],
Why lawyers are targeted
[94, "Why lawyers are targeted", "Why lawyers are targeted"],
Lawyers handle confidential documents, regulatory matters, litigation strategy, financial transactions, and sensitive negotiations. If a lawyer has their digital identity or account compromised, highly sensitive information can be exposed.
[95, "Lawyers handle confidential documents, regulatory matters, litigation strategy, financial transactions, and sensitive negotiations. If a lawyer has their digital identity or account compromised, highly sensitive information can be exposed.", "Lawyers handle confidential documents, regulatory matters, litigation strategy, financial transactions, and sensitive negotiations. If a lawyer has their digital identity or account compromised, highly sensitive information can be exposed."],
Which of the following BEST explains why lawyers are targeted by cybercriminals?
[96, "Which of the following BEST explains why lawyers are targeted by cybercriminals?", "Which of the following BEST explains why lawyers are targeted by cybercriminals?"],
Lawyers handle highly sensitive information.
[97, "Lawyers handle highly sensitive information.", "Lawyers handle highly sensitive information."],
Legal teams rarely use digital systems.
[98, "Legal teams rarely use digital systems.", "Legal teams rarely use digital systems."],
Legal work does not involve financial risk.
[99, "Legal work does not involve financial risk.", "Legal work does not involve financial risk."],
Legal communications are not time sensitive.
[100, "Legal communications are not time sensitive.", "Legal communications are not time sensitive."],
Privilege, authority, and access to highly sensitive information make lawyers high-value targets for cybercriminals.
[101, "Privilege, authority, and access to highly sensitive information make lawyers high-value targets for cybercriminals.", "Privilege, authority, and access to highly sensitive information make lawyers high-value targets for cybercriminals."],
Where cyberattacks often start
[102, "Where cyberattacks often start", "Where cyberattacks often start"],
Cyberattacks rarely appear suspicious at first. They masquerade as formal notices, urgent filings, documents, or links to websites that look legitimate and demand immediate attention.
[103, "Cyberattacks rarely appear suspicious at first. They masquerade as formal notices, urgent filings, documents, or links to websites that look legitimate and demand immediate attention.", "Cyberattacks rarely appear suspicious at first. They masquerade as formal notices, urgent filings, documents, or links to websites that look legitimate and demand immediate attention."],
Verify, don't assume
[104, "Verify, don't assume", "Verify, don't assume"],
Logos, names, and formal language can be replicated easily. A message can appear official while still being fraudulent. The source of a message should always be verified.
[105, "Logos, names, and formal language can be replicated easily. A message can appear official while still being fraudulent. The source of a message should always be verified.", "Logos, names, and formal language can be replicated easily. A message can appear official while still being fraudulent. The source of a message should always be verified."],
You receive an email claiming to be from a regulator with the correct case number and a link to download documents. What should you do first?
[106, "You receive an email claiming to be from a regulator with the correct case number and a link to download documents. What should you do first?", "You receive an email claiming to be from a regulator with the correct case number and a link to download documents. What should you do first?"],
Open the link to avoid missing the deadline.
[107, "Open the link to avoid missing the deadline.", "Open the link to avoid missing the deadline."],
Phone a friend.
[108, "Phone a friend.", "Phone a friend."],
Verify the sender using a known official channel before accessing anything.
[109, "Verify the sender using a known official channel before accessing anything.", "Verify the sender using a known official channel before accessing anything."],
Reply asking the sender to confirm their legitimacy.
[110, "Reply asking the sender to confirm their legitimacy.", "Reply asking the sender to confirm their legitimacy."],
Independent verification helps identify cases of impersonation or email spoofing and can protect you from inadvertently exposing sensitive information, or worse.
[111, "Independent verification helps identify cases of impersonation or email spoofing and can protect you from inadvertently exposing sensitive information, or worse.", "Independent verification helps identify cases of impersonation or email spoofing and can protect you from inadvertently exposing sensitive information, or worse."],
Urgency does not build trust
[112, "Urgency does not build trust", "Urgency does not build trust"],
Deadlines create pressure, but they do not remove the obligation to confirm the authenticity of a request. Cybercriminals rely on urgency to reduce scrutiny and bypass standard procedures.
[113, "Deadlines create pressure, but they do not remove the obligation to confirm the authenticity of a request. Cybercriminals rely on urgency to reduce scrutiny and bypass standard procedures. ", "Deadlines create pressure, but they do not remove the obligation to confirm the authenticity of a request. Cybercriminals rely on urgency to reduce scrutiny and bypass standard procedures. "],
Cybercriminals often use multiple communication channels
[114, "Cybercriminals often use multiple communication channels", "Cybercriminals often use multiple communication channels"],
Cybercriminals may use email, phone calls, texts, or meeting invites to make a request feel credible. Just because you've been contacted over multiple communication channels doesn't mean the other party is who they say they are.
[115, "Cybercriminals may use email, phone calls, texts, or meeting invites to make a request feel credible. Just because you've been contacted over multiple communication channels doesn't mean the other party is who they say they are.", "Cybercriminals may use email, phone calls, texts, or meeting invites to make a request feel credible. Just because you've been contacted over multiple communication channels doesn't mean the other party is who they say they are."],
You get an urgent email from an unknown address claiming to be a client. Shortly after, you get a call from the client who demands immediate action. What should you do?
[116, "You get an urgent email from an unknown address claiming to be a client. Shortly after, you get a call from the client who demands immediate action. What should you do?", "You get an urgent email from an unknown address claiming to be a client. Shortly after, you get a call from the client who demands immediate action. What should you do?"],
Act quickly since both email and phone confirm the request.
[117, "Act quickly since both email and phone confirm the request.", "Act quickly since both email and phone confirm the request."],
Ask the caller to resend the link and proceed.
[118, "Ask the caller to resend the link and proceed.", "Ask the caller to resend the link and proceed."],
Verify the request using a known contact point or communication channel before taking action.
[119, "Verify the request using a known contact point or communication channel before taking action.", "Verify the request using a known contact point or communication channel before taking action."],
Rely on the urgency and respond immediately.
[120, "Rely on the urgency and respond immediately.", "Rely on the urgency and respond immediately."],
Cybercriminals often use multiple communication channels to increase credibility. Independent verification through a known contact point or communication channel should always be done if a request is unexpected or from an unknown contact.
[121, "Cybercriminals often use multiple communication channels to increase credibility. Independent verification through a known contact point or communication channel should always be done if a request is unexpected or from an unknown contact.", "Cybercriminals often use multiple communication channels to increase credibility. Independent verification through a known contact point or communication channel should always be done if a request is unexpected or from an unknown contact."],
Your role carries authority
[122, "Your role carries authority", "Your role carries authority"],
Cybercriminals may attempt to masquerade as you in an attempt to have a client, colleague, supplier, or partner perform an adverse action. If you’re ever asked to validate the authenticity of a message sent by you, don’t take offense; it’s good cybersecurity hygiene.
[123, "Cybercriminals may attempt to masquerade as you in an attempt to have a client, colleague, supplier, or partner perform an adverse action. If you’re ever asked to validate the authenticity of a message sent by you, don’t take offense; it’s good cybersecurity hygiene.", "Cybercriminals may attempt to masquerade as you in an attempt to have a client, colleague, supplier, or partner perform an adverse action. If you’re ever asked to validate the authenticity of a message sent by you, don’t take offense; it’s good cybersecurity hygiene."],
Which scenario BEST reflects an impersonation attempt?
[124, "Which scenario BEST reflects an impersonation attempt?", "Which scenario BEST reflects an impersonation attempt?"],
An expected email from a colleague at an unknown email address
[125, "An expected email from a colleague at an unknown email address", "An expected email from a colleague at an unknown email address"],
A routine internal calendar invite
[126, "A routine internal calendar invite ", "A routine internal calendar invite "],
An expected email from a colleague at a known email address
[127, "An expected email from a colleague at a known email address", "An expected email from a colleague at a known email address"],
A confirmed vendor invoice processed normally
[128, "A confirmed vendor invoice processed normally ", "A confirmed vendor invoice processed normally "],
Cybercriminals will often attempt to impersonate someone you know in an attempt to leverage the trust you have for that person. If an email is from an unknown or unexpected email address, it’s a telltale sign of a potential impersonation attempt.
[129, "Cybercriminals will often attempt to impersonate someone you know in an attempt to leverage the trust you have for that person. If an email is from an unknown or unexpected email address, it’s a telltale sign of a potential impersonation attempt.", "Cybercriminals will often attempt to impersonate someone you know in an attempt to leverage the trust you have for that person. If an email is from an unknown or unexpected email address, it’s a telltale sign of a potential impersonation attempt."],
What cybercriminals want
[130, "What cybercriminals want", "What cybercriminals want"],
Cybercriminals ultimately want you to perform an adverse action. This could be inadvertently providing them with your account credentials, opening a malicious document, or sending a payment, to name a few. To achieve this goal, phishing websites are commonly used. Let’s explore phishing websites further.
[131, "Cybercriminals ultimately want you to perform an adverse action. This could be inadvertently providing them with your account credentials, opening a malicious document, or sending a payment, to name a few. To achieve this goal, phishing websites are commonly used. Let’s explore phishing websites further.", "Cybercriminals ultimately want you to perform an adverse action. This could be inadvertently providing them with your account credentials, opening a malicious document, or sending a payment, to name a few. To achieve this goal, phishing websites are commonly used. Let’s explore phishing websites further."],
Phishing websites can be highly convincing
[132, "Phishing websites can be highly convincing", "Phishing websites can be highly convincing"],
Phishing websites can be highly deceptive and designed to look and feel exactly like the real thing. It’s important to always look at the domain of the website and check that it matches what’s expected. Wherever possible, avoid clicking links inside emails, and instead use a bookmarked link or one taken from a trusted location.
[133, "Phishing websites can be highly deceptive and designed to look and feel exactly like the real thing. It’s important to always look at the domain of the website and check that it matches what’s expected. Wherever possible, avoid clicking links inside emails, and instead use a bookmarked link or one taken from a trusted location. ", "Phishing websites can be highly deceptive and designed to look and feel exactly like the real thing. It’s important to always look at the domain of the website and check that it matches what’s expected. Wherever possible, avoid clicking links inside emails, and instead use a bookmarked link or one taken from a trusted location. "],
How to spot phishing websites
[134, "How to spot phishing websites", "How to spot phishing websites"],
The most effective method for spotting a phishing website is to analyze the URL and specifically look for the primary domain and determine if it matches what’s expected. For example, <strong>attacker.com</strong> is the primary domain inside the following URL: <strong>https://microsoft.attacker.com/security?query=valid</strong>
[135, "The most effective method for spotting a phishing website is to analyze the URL and specifically look for the primary domain and determine if it matches what’s expected. For example, **attacker.com** is the primary domain inside the following URL: **https://microsoft.attacker.com/security?query=valid**", "The most effective method for spotting a phishing website is to analyze the URL and specifically look for the primary domain and determine if it matches what’s expected. For example, <strong>attacker.com</strong> is the primary domain inside the following URL: <strong>https://microsoft.attacker.com/security?query=valid</strong>"],
The most effective method for spotting a phishing website is to look at the primary domain and determine if it matches what’s expected.
[136, "The most effective method for spotting a phishing website is to look at the primary domain and determine if it matches what’s expected.", "The most effective method for spotting a phishing website is to look at the primary domain and determine if it matches what’s expected."],
The primary domain is the only part of a URL that can’t be faked; it needs to be registered with a domain registrar that controls who owns what domain. All other parts of a URL can be faked or altered. It’s important to recognize that while primary domains can’t be faked, cybercriminals can use techniques to make domains look very similar.
[137, "The primary domain is the only part of a URL that can’t be faked; it needs to be registered with a domain registrar that controls who owns what domain. All other parts of a URL can be faked or altered. It’s important to recognize that while primary domains can’t be faked, cybercriminals can use techniques to make domains look very similar.", "The primary domain is the only part of a URL that can’t be faked; it needs to be registered with a domain registrar that controls who owns what domain. All other parts of a URL can be faked or altered. It’s important to recognize that while primary domains can’t be faked, cybercriminals can use techniques to make domains look very similar."],
Your account is your digital identity
[138, "Your account is your digital identity", "Your account is your digital identity"],
Beyond being able to spot phishing websites, it’s important to protect your digital identity by following good cyber security hygiene practices. Let’s explore this in more detail.
[139, "Beyond being able to spot phishing websites, it’s important to protect your digital identity by following good cyber security hygiene practices. Let’s explore this in more detail.", "Beyond being able to spot phishing websites, it’s important to protect your digital identity by following good cyber security hygiene practices. Let’s explore this in more detail."],
Protecting your devices
[140, "Protecting your devices", "Protecting your devices"],
To protect your devices, you should: Keep your computer up to date with security patches. Use strong, unique passwords for all of your accounts. Use multi-factor authentication. Last but not least, keep antivirus software up-to-date.
[141, "To protect your devices, you should: Keep your computer up to date with security patches. Use strong, unique passwords for all of your accounts. Use multi-factor authentication. Last but not least, keep antivirus software up-to-date.", "To protect your devices, you should: Keep your computer up to date with security patches. Use strong, unique passwords for all of your accounts. Use multi-factor authentication. Last but not least, keep antivirus software up-to-date."],
Which of the following is NOT a way to protect your devices?
[142, "Which of the following is NOT a way to protect your devices?", "Which of the following is NOT a way to protect your devices?"],
Install antivirus software.
[143, "Install antivirus software.", "Install antivirus software."],
Keep your computer up to date with security patches.
[144, "Keep your computer up to date with security patches.", "Keep your computer up to date with security patches."],
Avoid using multi-factor authentication because it slows you down.
[145, "Avoid using multi-factor authentication because it slows you down.", "Avoid using multi-factor authentication because it slows you down."],
Always use strong, unique passwords.
[146, "Always use strong, unique passwords.", "Always use strong, unique passwords."],
Where possible, you should use multi-factor authentication (MFA). MFA helps to prevent attackers from brute-forcing your password or simply stealing it through other means and then accessing your accounts.
[147, "Where possible, you should use multi-factor authentication (MFA). MFA helps to prevent attackers from brute-forcing your password or simply stealing it through other means and then accessing your accounts.", "Where possible, you should use multi-factor authentication (MFA). MFA helps to prevent attackers from brute-forcing your password or simply stealing it through other means and then accessing your accounts."],
Protecting your data
[148, "Protecting your data", "Protecting your data"],
To protect your data from cybercriminals, you should:
[149, "To protect your data from cybercriminals, you should:", "To protect your data from cybercriminals, you should:"],
Encrypt your data
[150, "Encrypt your data", "Encrypt your data"],
It's good to encrypt your data because it adds an extra layer of protection against cybercriminals. Encryption is a method of encoding data so that it can only be accessed by someone with the proper decryption key. This means that even if your data falls into the wrong hands, it will be much harder for an attacker to access it.
[151, "It's good to encrypt your data because it adds an extra layer of protection against cybercriminals. Encryption is a method of encoding data so that it can only be accessed by someone with the proper decryption key. This means that even if your data falls into the wrong hands, it will be much harder for an attacker to access it.", "It's good to encrypt your data because it adds an extra layer of protection against cybercriminals. Encryption is a method of encoding data so that it can only be accessed by someone with the proper decryption key. This means that even if your data falls into the wrong hands, it will be much harder for an attacker to access it."],
Back up your data
[152, "Back up your data", "Back up your data"],
It's good to back up your data because it provides a way to restore your data in the event of a cyberattack, hardware failure, or other data loss event. By regularly backing up your data, you can ensure that you have a copy of your important files and information that you can access in the event of a disaster.
[153, "It's good to back up your data because it provides a way to restore your data in the event of a cyberattack, hardware failure, or other data loss event. By regularly backing up your data, you can ensure that you have a copy of your important files and information that you can access in the event of a disaster.", "It's good to back up your data because it provides a way to restore your data in the event of a cyberattack, hardware failure, or other data loss event. By regularly backing up your data, you can ensure that you have a copy of your important files and information that you can access in the event of a disaster."],
Use unique passwords
[154, "Use unique passwords", "Use unique passwords"],
It's good to use unique passwords when securing data because it helps make it more difficult for an attacker to gain access to all of your accounts and data. Even if an attacker finds your password in a breach or password dump, they will only have limited access to your online identity.
[155, "It's good to use unique passwords when securing data because it helps make it more difficult for an attacker to gain access to all of your accounts and data. Even if an attacker finds your password in a breach or password dump, they will only have limited access to your online identity.", "It's good to use unique passwords when securing data because it helps make it more difficult for an attacker to gain access to all of your accounts and data. Even if an attacker finds your password in a breach or password dump, they will only have limited access to your online identity."],
What's the BEST method to protect your data from cyber attacks?
[156, "What's the BEST method to protect your data from cyber attacks?", "What's the BEST method to protect your data from cyber attacks?"],
Stay away from the internet and computers in general.
[157, "Stay away from the internet and computers in general.", "Stay away from the internet and computers in general."],
Use an aluminum apparatus to protect the wearer's head from anomalous transmissions.
[158, "Use an aluminum apparatus to protect the wearer's head from anomalous transmissions.", "Use an aluminum apparatus to protect the wearer's head from anomalous transmissions."],
Regularly back up any sensitive data and store the backup in a secure location.
[159, "Regularly back up any sensitive data and store the backup in a secure location.", "Regularly back up any sensitive data and store the backup in a secure location."],
Encrypt sensitive data with a password you use across all your accounts so you won't forget it.
[160, "Encrypt sensitive data with a password you use across all your accounts so you won't forget it.", "Encrypt sensitive data with a password you use across all your accounts so you won't forget it."],
To protect your data from cyber attacks, it's best that you regularly back up your data in a secure location, encrypt your data, and ensure you use unique passwords to prevent attackers from compromising your online identity in the event they find just one password.
[161, "To protect your data from cyber attacks, it's best that you regularly back up your data in a secure location, encrypt your data, and ensure you use unique passwords to prevent attackers from compromising your online identity in the event they find just one password.", "To protect your data from cyber attacks, it's best that you regularly back up your data in a secure location, encrypt your data, and ensure you use unique passwords to prevent attackers from compromising your online identity in the event they find just one password."],
Wrapping Up
[162, "Wrapping Up ", "Wrapping Up "],
By following the practices outlined in this training, you can keep your clients safe and your reputation spotless.
[163, "By following the practices outlined in this training, you can keep your clients safe and your reputation spotless. ", "By following the practices outlined in this training, you can keep your clients safe and your reputation spotless. "],
[164, "", ""],
Original Text (English)
Correct Translation (English)
Submissions are reviewed and applied within 48 hours.
Color Theme And Background Selector
×
Colorful Theme
Select Theme
Blue Theme
Select Theme
Light Theme
Select Theme
Purple Theme
Select Theme
Green Theme
Select Theme
Dark Theme
Select Theme
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.