Leaflet
Don’t be an easy target! Create a cyber security culture in your place of work, school, or center to reduce the exposure to cyber security threats and data breaches. Stop | Think | Connect to transform your organization today.
Use code given by volunteer to download the brochure.
Download
Quick Heal Foundation
Download Brochure
Cyber Awareness Quiz Fill in your details By submitting this form you agree to the CSR Policy and Terms of Use 1 / 5 1) Why should you be cautious when downloading files from the internet? To avoid malware and viruses To protect your device from hacking To prevent identity theft All of the above 2 / 5 2) Why are humans still the weakest link despite security training and resources? Threat actors spend their days thinking of new ways to exploit human vulnerabilities and are rewarded for their innovation. Most of the people take calls, mails asking for personal information casually & give away every detail Young people think "Friendship whether it is old or new, is more important than password or hotspot" All of the above 3 / 5 3) What is two-factor authentication (2FA)? Using two different devices to access your accounts Using a combination of two different authentication methods to verify your identity Using two different passwords for the same account A way to reset your password if you forget it 4 / 5 4) What should you do if you notice any unusual activity on your online accounts? Share your login details with a friend to check it Ignore it Report it to the website or app provider Log out and do nothing 5 / 5 5) What information does social media know about you? Your name and email address Your location and interests Your friends and family All of the above Your score is Share: LinkedIn Facebook Twitter 0%
Cyber Awareness Quiz
Fill in your details
By submitting this form you agree to the CSR Policy and Terms of Use
1 / 5
1) Why should you be cautious when downloading files from the internet?
2 / 5
2) Why are humans still the weakest link despite security training and resources?
3 / 5
3) What is two-factor authentication (2FA)?
4 / 5
4) What should you do if you notice any unusual activity on your online accounts?
5 / 5
5) What information does social media know about you?
Your score is
Share:
We use cookies to ensure that we give you the best experience on our website. If you continue, we will assume that you agree to our cookie policy. Close