Leaflet
Don’t be an easy target! Create a cyber security culture in your place of work, school, or center to reduce the exposure to cyber security threats and data breaches. Stop | Think | Connect to transform your organization today.
Use code given by volunteer to download the brochure.
Download
Quick Heal Foundation
Download Brochure
Cyber Challenge Fill in your details By submitting this form you agree to the CSR Policy and Terms of Use 1 / 5 1) Why should you avoid downloading apps or software from unauthorised sources? Because they are free Because they might contain viruses or malware Because they are more fun Because they might ask for money 2 / 5 2) What should you do if you see someone being bullied online? Join in and bully them too Ignore it Report it to a trusted adult or authority figure None of the above 3 / 5 3) Which one is an example of strong password pD#tC$30 14072007 (date of birth) Amruta (Your name) 7654987609 (Your mobile number) 4 / 5 4) What should you do if you receive a friend request from someone you don't know on social media? Accept the request Decline the request Ask your parents before accepting the request None of the above 5 / 5 5) Which of the following is a strong password? Your pet's name A combination of letters, numbers, and symbols Your birth date Your name Your score is Share: LinkedIn Facebook Twitter 0%
Cyber Challenge
Fill in your details
By submitting this form you agree to the CSR Policy and Terms of Use
1 / 5
1) Why should you avoid downloading apps or software from unauthorised sources?
2 / 5
2) What should you do if you see someone being bullied online?
3 / 5
3) Which one is an example of strong password
4 / 5
4) What should you do if you receive a friend request from someone you don't know on social media?
5 / 5
5) Which of the following is a strong password?
Your score is
Share:
We use cookies to ensure that we give you the best experience on our website. If you continue, we will assume that you agree to our cookie policy. Close