1 threat … 3 remedies

Match the right remedies for each threat

Please fill your personal data below.

These data are only used when you register for training to ensure a custom follow-up.

Fullname (Firstname + Lastname)
Email
Company
Move the remedies in the right column up or down to match them with the corresponding threat in the left column.

Brute force attack
Trojan horse
Data theft
Sniffing
Data breach
Privacy invasion
Phishing
Exploit vulnerability
Social engineering
1) Encrypt sensitive data on your computer and devices. 2) Use network shares with the most restrictive permissions. 3) Put a password on files transferred through upload platforms.
1) Use a VPN on public WiFi networks. 2) Beware of fake access points. 3) Only use secured (encrypted) protocols.
1) Use the most recent version of applications. 2) Update your systems. 3) Change the default password on Internet connected devices.
1) Share less on social media. 2) Configure privacy and security settings on your webbrowser and web applications. 3) Use an advertising blocker.
1) Never give confidential information on the phone (don't hang on, hang up). 2) Never trust strangers. 3) Double check identities in case of impacting demands.
1) Use unique passwords. 2) Use complex passwords without logic. 3) Activate 2FA when possible.
1) Don't use default usernames ("admin", etc.). 2) Use long passwords. 3) Limit the number of login attempts.