[{"data":1,"prerenderedAt":1788},["ShallowReactive",2],{"i-kinnu:logo":3,"i-kinnu:origami-folding":8,"pathway-technology-cybersecurity":12,"i-lucide:chevron-right":1783,"i-lucide:tag":1786},{"left":4,"top":4,"width":5,"height":5,"rotate":4,"vFlip":6,"hFlip":6,"body":7},0,27,false,"\u003Cg fill=\"none\">\u003Cpath d=\"M0.046875 1.05555C0.046875 1.03541 0.048197 1.01579 0.0507438 0.996728C0.0987149 0.438619 0.586845 0 1.18194 0H25.4398C26.451 0 26.9575 1.171 26.2424 1.85585L15.7301 11.9243L1.31574 0.903476C1.17475 0.79568 1.01137 0.761884 0.859586 0.784111L26.2936 25.1441C27.0086 25.829 26.5022 27 25.4909 27H1.18194C0.555061 27 0.046875 26.5133 0.046875 25.9129V1.05555Z\" fill=\"currentColor\"/>\u003C/g>",{"left":4,"top":4,"width":9,"height":10,"rotate":4,"vFlip":6,"hFlip":6,"body":11},1000,236,"\u003Cg fill=\"none\">\u003Cpath fill-rule=\"evenodd\" clip-rule=\"evenodd\"\n    d=\"M193.68 38.2238C195.994 38.2238 197.87 40.0989 197.87 42.412V231.812C197.87 234.125 195.994 236 193.68 236H4.19013C1.87603 236 2.02305e-07 234.125 0 231.812V42.412C-2.02305e-07 40.0989 1.87603 38.2238 4.19013 38.2238H193.68ZM111.76 89.0072C111.685 87.9474 110.572 87.2905 109.608 87.7376L96.8872 93.641C95.7786 94.1554 95.702 95.7016 96.7545 96.3225L101.579 99.167C94.7045 109.365 90.5733 122.892 90.5732 137.642C90.5733 154.323 95.8569 169.439 104.416 179.945C105.301 181.032 106.9 181.196 107.987 180.311C109.075 179.426 109.238 177.828 108.353 176.741C100.621 167.25 95.6522 153.305 95.6521 137.642C95.6522 123.661 99.6138 111.051 105.963 101.754L110.456 104.403C111.508 105.024 112.826 104.21 112.74 102.991L111.76 89.0072ZM9.63194 136.286C9.14864 136.286 8.75684 136.678 8.75684 137.161C8.7569 137.644 9.14868 138.035 9.63194 138.035H17.2161C17.6993 138.035 18.0912 137.644 18.0912 137.161C18.0912 136.678 17.6994 136.286 17.2161 136.286H9.63194ZM22.6813 136.286C22.198 136.286 21.8062 136.678 21.8062 137.161C21.8063 137.644 22.1981 138.035 22.6813 138.035H30.2655C30.7487 138.035 31.1406 137.644 31.1406 137.161C31.1406 136.678 30.7488 136.286 30.2655 136.286H22.6813ZM35.7464 136.286C35.2631 136.286 34.8713 136.678 34.8713 137.161C34.8713 137.644 35.2631 138.035 35.7464 138.035H44.4973C44.9805 138.035 45.3724 137.644 45.3724 137.161C45.3724 136.678 44.9806 136.286 44.4973 136.286H35.7464ZM49.9977 136.286C49.5144 136.286 49.1226 136.678 49.1226 137.161C49.1226 137.644 49.5144 138.035 49.9977 138.035H57.5819C58.0651 138.035 58.4569 137.644 58.457 137.161C58.457 136.678 58.0651 136.286 57.5819 136.286H49.9977ZM63.0783 136.286C62.595 136.286 62.2032 136.678 62.2032 137.161C62.2033 137.644 62.5951 138.035 63.0783 138.035H70.6625C71.1457 138.035 71.5375 137.644 71.5376 137.161C71.5376 136.678 71.1457 136.286 70.6625 136.286H63.0783ZM76.1277 136.286C75.6444 136.286 75.2526 136.678 75.2526 137.161C75.2527 137.644 75.6445 138.035 76.1277 138.035H83.7119C84.1951 138.035 84.5869 137.644 84.587 137.161C84.587 136.678 84.1951 136.286 83.7119 136.286H76.1277ZM102.266 136.286C101.782 136.286 101.39 136.678 101.39 137.161C101.391 137.644 101.782 138.035 102.266 138.035H109.85C110.333 138.035 110.725 137.644 110.725 137.161C110.725 136.678 110.333 136.286 109.85 136.286H102.266ZM115.338 136.286C114.855 136.286 114.463 136.678 114.463 137.161C114.463 137.644 114.855 138.035 115.338 138.035H122.923C123.406 138.035 123.798 137.644 123.798 137.161C123.798 136.678 123.406 136.286 122.923 136.286H115.338ZM128.403 136.286C127.92 136.286 127.528 136.678 127.528 137.161C127.528 137.644 127.92 138.035 128.403 138.035H135.988C136.471 138.035 136.863 137.644 136.863 137.161C136.863 136.678 136.471 136.286 135.988 136.286H128.403ZM141.468 136.286C140.985 136.286 140.593 136.678 140.593 137.161C140.593 137.644 140.985 138.035 141.468 138.035H149.053C149.536 138.035 149.928 137.644 149.928 137.161C149.928 136.678 149.536 136.286 149.053 136.286H141.468ZM154.541 136.286C154.058 136.286 153.666 136.678 153.666 137.161C153.666 137.644 154.058 138.035 154.541 138.035H162.125C162.609 138.035 163 137.644 163.001 137.161C163.001 136.678 162.609 136.286 162.125 136.286H154.541ZM167.614 136.286C167.131 136.286 166.739 136.678 166.739 137.161C166.739 137.644 167.131 138.035 167.614 138.035H175.198C175.681 138.035 176.073 137.644 176.073 137.161C176.073 136.678 175.681 136.286 175.198 136.286H167.614ZM180.671 136.286C180.188 136.286 179.796 136.678 179.796 137.161C179.796 137.644 180.188 138.035 180.671 138.035H188.255C188.739 138.035 189.13 137.644 189.131 137.161C189.131 136.678 188.739 136.286 188.255 136.286H180.671Z\"\n    fill=\"currentColor\" />\n  \u003Cpath fill-rule=\"evenodd\" clip-rule=\"evenodd\"\n    d=\"M444.85 38.2277C447.164 38.2277 449.04 40.1028 449.04 42.4159V132.928C449.04 135.241 447.164 137.116 444.85 137.116H255.36C253.046 137.116 251.17 135.241 251.17 132.928V42.4159C251.17 40.1028 253.046 38.2277 255.36 38.2277H444.85ZM361.96 125.388C361.618 125.046 361.064 125.046 360.722 125.388L354.534 131.572C354.192 131.914 354.192 132.468 354.534 132.81C354.876 133.151 355.43 133.151 355.772 132.81L361.96 126.624C362.301 126.283 362.301 125.73 361.96 125.388ZM371.047 116.311C370.705 115.969 370.15 115.969 369.809 116.311L364.446 121.671C364.104 122.012 364.104 122.567 364.446 122.908C364.788 123.249 365.342 123.25 365.684 122.908L371.047 117.548C371.388 117.207 371.388 116.652 371.047 116.311ZM380.124 107.246C379.782 106.904 379.227 106.904 378.885 107.246L373.523 112.606C373.181 112.948 373.181 113.502 373.523 113.844C373.864 114.185 374.419 114.185 374.761 113.844L380.124 108.483C380.465 108.142 380.465 107.587 380.124 107.246ZM385.736 65.8841C385.891 64.6727 384.622 63.7845 383.536 64.3434L371.069 70.7636C370.124 71.2504 369.96 72.5334 370.752 73.2424L381.2 82.5938C382.11 83.4081 383.561 82.8672 383.717 81.6557L384.393 76.3725C391.143 77.1933 398.567 80.7709 404.771 86.9711C411.124 93.3213 414.726 100.952 415.43 107.827C415.573 109.221 416.819 110.236 418.214 110.093C419.609 109.95 420.624 108.703 420.481 107.309C419.644 99.1317 415.435 90.4514 408.362 83.3817C401.466 76.489 393.038 72.3185 385.038 71.338L385.736 65.8841ZM389.2 98.1733C388.859 97.8319 388.304 97.8318 387.962 98.1733L382.6 103.534C382.258 103.875 382.258 104.429 382.6 104.771C382.941 105.112 383.496 105.112 383.838 104.771L389.2 99.4108C389.542 99.0693 389.542 98.5149 389.2 98.1733ZM398.262 89.1047C397.92 88.7633 397.365 88.7632 397.024 89.1047L391.661 94.4649C391.319 94.8065 391.319 95.3608 391.661 95.7024C392.002 96.0436 392.557 96.0438 392.899 95.7024L398.262 90.3421C398.603 90.0007 398.603 89.4463 398.262 89.1047ZM416.431 70.9616C416.089 70.6202 415.534 70.6201 415.193 70.9616L409.83 76.3218C409.488 76.6634 409.488 77.2177 409.83 77.5592C410.172 77.9005 410.726 77.9007 411.068 77.5592L416.431 72.199C416.772 71.8575 416.772 71.3032 416.431 70.9616ZM425.508 61.891C425.166 61.5496 424.611 61.5495 424.27 61.891L418.907 67.2512C418.565 67.5928 418.565 68.1471 418.907 68.4887C419.249 68.8299 419.803 68.8301 420.145 68.4887L425.508 63.1284C425.849 62.787 425.849 62.2326 425.508 61.891ZM434.569 52.8146C434.227 52.4731 433.673 52.4731 433.331 52.8146L427.968 58.1748C427.626 58.5163 427.627 59.0706 427.968 59.4122C428.31 59.7534 428.864 59.7537 429.206 59.4122L434.569 54.052C434.91 53.7105 434.91 53.1562 434.569 52.8146ZM443.638 43.7479C443.296 43.4065 442.742 43.4064 442.4 43.7479L437.037 49.1081C436.695 49.4496 436.696 50.004 437.037 50.3455C437.379 50.6868 437.933 50.687 438.275 50.3455L443.638 44.9853C443.98 44.6438 443.979 44.0895 443.638 43.7479Z\"\n    fill=\"currentColor\" />\n  \u003Cpath fill-rule=\"evenodd\" clip-rule=\"evenodd\"\n    d=\"M684.066 38.2277C687.798 38.2281 689.667 42.7391 687.027 45.3773L596.473 135.889C595.687 136.675 594.621 137.116 593.51 137.116H506.335C504.021 137.116 502.145 135.241 502.145 132.928V42.4159C502.145 40.1028 504.021 38.2277 506.335 38.2277H684.066ZM514.603 124.566C514.261 124.224 513.707 124.224 513.365 124.566L507.178 130.751C506.836 131.093 506.836 131.646 507.178 131.988C507.519 132.329 508.073 132.329 508.415 131.988L514.603 125.803C514.945 125.462 514.945 124.908 514.603 124.566ZM523.689 115.491C523.348 115.15 522.794 115.15 522.452 115.491L517.09 120.852C516.748 121.193 516.748 121.747 517.09 122.088C517.431 122.43 517.985 122.43 518.327 122.088L523.689 116.728C524.031 116.386 524.031 115.833 523.689 115.491ZM532.102 65.8295C530.707 65.6872 529.46 66.7017 529.318 68.0957C529.175 69.4896 530.189 70.7355 531.584 70.8787C538.463 71.5825 546.096 75.1826 552.45 81.5329C558.723 87.8037 562.312 95.3226 563.079 102.13L557.738 102.392C556.518 102.452 555.865 103.855 556.607 104.827L565.115 115.969C565.76 116.814 567.051 116.751 567.611 115.847L574.992 103.928C575.635 102.889 574.848 101.555 573.628 101.615L568.161 101.882C568.161 101.878 568.162 101.874 568.161 101.871C567.324 93.6931 563.114 85.0124 556.041 77.9425C548.968 70.873 540.283 66.6668 532.102 65.8295ZM532.766 106.421C532.425 106.079 531.871 106.079 531.529 106.421L526.166 111.781C525.825 112.123 525.825 112.676 526.166 113.018C526.508 113.359 527.062 113.359 527.403 113.018L532.766 107.657C533.108 107.316 533.108 106.762 532.766 106.421ZM541.843 97.3445C541.501 97.003 540.948 97.003 540.606 97.3445L535.243 102.705C534.901 103.046 534.902 103.6 535.243 103.941C535.585 104.283 536.139 104.283 536.48 103.941L541.843 98.5809C542.185 98.2393 542.185 97.686 541.843 97.3445ZM550.92 88.2778C550.578 87.9363 550.025 87.9363 549.683 88.2778L544.32 93.638C543.978 93.9796 543.978 94.5329 544.32 94.8745C544.662 95.2161 545.215 95.2161 545.557 94.8745L550.92 89.5142C551.262 89.1727 551.262 88.6193 550.92 88.2778ZM569.066 70.1405C568.724 69.799 568.17 69.7991 567.829 70.1405L562.466 75.5008C562.124 75.8423 562.124 76.3956 562.466 76.7372C562.808 77.0788 563.361 77.0788 563.703 76.7372L569.066 71.377C569.407 71.0354 569.407 70.4821 569.066 70.1405ZM578.143 61.0699C577.801 60.7284 577.247 60.7285 576.906 61.0699L571.543 66.4302C571.201 66.7717 571.201 67.3251 571.543 67.6666C571.885 68.0082 572.438 68.0082 572.78 67.6666L578.143 62.3064C578.484 61.9648 578.484 61.4115 578.143 61.0699ZM587.219 51.9896C586.878 51.6481 586.324 51.6481 585.982 51.9896L580.62 57.3498C580.278 57.6914 580.278 58.2447 580.62 58.5863C580.961 58.9279 581.515 58.9279 581.857 58.5863L587.219 53.2261C587.561 52.8845 587.561 52.3312 587.219 51.9896ZM596.288 42.9249C595.947 42.5833 595.392 42.5833 595.05 42.9249L589.689 48.2851C589.347 48.6267 589.347 49.18 589.689 49.5216C590.03 49.863 590.584 49.8631 590.926 49.5216L596.288 44.1613C596.63 43.8198 596.63 43.2664 596.288 42.9249Z\"\n    fill=\"currentColor\" />\n  \u003Cpath fill-rule=\"evenodd\" clip-rule=\"evenodd\"\n    d=\"M850.814 38.2277C854.547 38.2281 856.416 42.739 853.777 45.3773L763.223 135.889C762.437 136.674 761.371 137.116 760.26 137.116H673.176C669.443 137.116 667.574 132.605 670.213 129.966L760.768 39.4544C761.554 38.6692 762.62 38.2277 763.731 38.2277H850.814ZM761.338 121.8C760.855 121.8 760.463 122.191 760.463 122.674V131.13H762.213V122.674C762.213 122.191 761.821 121.8 761.338 121.8ZM761.338 108.971C760.855 108.971 760.463 109.363 760.463 109.846V118.301H762.213V109.846C762.213 109.363 761.821 108.971 761.338 108.971ZM761.338 96.1402C760.855 96.1406 760.463 96.5321 760.463 97.0149V105.47H762.213V97.0149C762.213 96.532 761.821 96.1404 761.338 96.1402ZM782.263 71.887C781.043 71.951 780.395 73.3571 781.139 74.3257L784.474 78.6631C779.115 82.951 771.242 85.7443 762.35 85.7444C753.366 85.7442 745.421 82.8944 740.059 78.5305C738.972 77.6461 737.373 77.8099 736.488 78.8961C735.602 79.983 735.766 81.582 736.853 82.467C743.231 87.6574 752.348 90.8207 762.35 90.8209C772.209 90.8208 781.205 87.746 787.568 82.6884L790.833 86.9341C791.577 87.9025 793.103 87.6391 793.479 86.4767L797.791 73.138C798.118 72.127 797.33 71.1017 796.268 71.1566L782.263 71.887ZM761.338 70.4847C760.855 70.4851 760.463 70.8767 760.463 71.3594V79.8147H762.213V71.3594C762.213 70.8766 761.821 70.485 761.338 70.4847ZM761.338 57.656C760.855 57.6564 760.463 58.048 760.463 58.5307V66.986H762.213V58.5307C762.213 58.0479 761.821 57.6563 761.338 57.656ZM761.338 44.8293C760.855 44.8297 760.463 45.2212 760.463 45.704V54.1592H762.213V45.704C762.213 45.2211 761.821 44.8295 761.338 44.8293Z\"\n    fill=\"currentColor\" />\n  \u003Cpath\n    d=\"M995.759 38.2277C999.53 38.228 1001.42 42.5171 998.752 45.0253L959.55 81.9005L905.796 41.5363C905.271 41.1418 904.662 41.0182 904.096 41.0994L997.485 130.319C1000.15 132.828 998.262 137.116 994.491 137.116H905.298C902.96 137.116 901.065 135.333 901.065 133.134V42.0941C901.065 42.0204 901.07 41.9483 901.079 41.8786C901.258 39.8345 903.079 38.2277 905.298 38.2277H995.759Z\"\n    fill=\"currentColor\" />\n  \u003Cpath\n    d=\"M505.873 0C506.657 4.57042e-05 507.307 0.195499 507.823 0.587023C508.338 0.969046 508.596 1.53802 508.596 2.29251C508.596 2.76034 508.467 3.19015 508.209 3.58162C507.951 3.96344 507.497 4.26401 506.848 4.48361V4.54114C507.65 4.67487 508.205 4.96191 508.51 5.4012C508.816 5.83087 508.969 6.31772 508.969 6.86193C508.969 7.74056 508.672 8.41851 508.08 8.89604C507.497 9.38304 506.733 9.62731 505.787 9.62738C504.861 9.62738 504.158 9.42172 503.68 9.0111C503.212 8.60054 502.935 8.08005 502.849 7.44993L503.881 7.10571L503.924 7.24028C504.035 7.54934 504.211 7.82925 504.454 8.07986C504.731 8.36635 505.166 8.50986 505.758 8.50989C506.465 8.50989 506.943 8.32772 507.191 7.9648C507.449 7.6019 507.579 7.20078 507.579 6.7615C507.579 6.2173 507.378 5.80683 506.977 5.52992C506.585 5.25295 505.93 5.10026 505.013 5.07161V4.15402C505.901 4.12537 506.489 3.92484 506.776 3.55237C507.062 3.18009 507.206 2.82242 507.206 2.47876C507.206 1.62801 506.752 1.17539 505.845 1.12237L505.658 1.11749C505.467 1.11752 505.242 1.14605 504.985 1.2033C504.736 1.25105 504.511 1.3274 504.31 1.43245L504.081 2.56457L503.05 2.44951L503.322 0.687461C503.666 0.49653 504.068 0.33454 504.526 0.200875C504.985 0.0671945 505.434 0 505.873 0Z\"\n    fill=\"currentColor\" />\n  \u003Cpath\n    d=\"M905.727 2.30616L904.638 2.4066L904.466 1.26083H901.428V3.72497C901.533 3.71544 901.643 3.71034 901.757 3.71034H902.086C902.755 3.71034 903.386 3.78668 903.979 3.93949C904.58 4.09229 905.068 4.38363 905.44 4.8132C905.822 5.23335 906.014 5.84949 906.014 6.66106C906.014 7.64468 905.722 8.38068 905.14 8.86776C904.557 9.36434 903.783 9.6127 902.818 9.61275C901.91 9.61275 901.213 9.40711 900.725 8.99648C900.248 8.59544 899.96 8.08007 899.865 7.44993L900.911 7.10571C901.007 7.49723 901.203 7.8271 901.499 8.09449C901.795 8.37131 902.211 8.50985 902.746 8.50989C903.395 8.50989 903.869 8.33787 904.165 7.99405C904.461 7.65981 904.609 7.22507 904.609 6.69031C904.609 5.87861 904.337 5.3625 903.792 5.14279C903.248 4.91361 902.612 4.79958 901.886 4.79955C901.695 4.79955 901.489 4.80365 901.27 4.8132C901.059 4.82275 900.854 4.83701 900.653 4.85611L900.224 4.44071V0.143343H905.569L905.727 2.30616Z\"\n    fill=\"currentColor\" />\n  \u003Cpath fill-rule=\"evenodd\" clip-rule=\"evenodd\"\n    d=\"M765.49 6.04576H766.966L766.837 7.14862H765.49V9.48404H764.185V7.14862H759.857L759.713 6.04576L762.909 0.143343H765.49V6.04576ZM760.96 6.04576H764.185V1.26083H763.541L760.96 6.04576Z\"\n    fill=\"currentColor\" />\n  \u003Cpath d=\"M4.80573 6.47481H6.41154V7.60693H1.81068V6.47481H3.50235V1.27546H1.81068V0.143343H4.80573V6.47481Z\"\n    fill=\"currentColor\" />\n  \u003Cpath\n    d=\"M254.359 0C255.353 0 256.055 0.239186 256.466 0.716715C256.877 1.18447 257.083 1.68072 257.083 2.20573C257.083 2.85516 256.849 3.44346 256.38 3.96875C255.912 4.49397 255.348 4.96638 254.689 5.38657C254.039 5.79717 253.437 6.15968 252.883 6.47481H256.423L256.538 5.42948L257.599 5.51529L257.426 7.60693H251.407L251.292 6.58987C252.582 5.73032 253.638 4.98523 254.46 4.35489C255.281 3.71509 255.693 3.05632 255.693 2.37832C255.693 1.53787 255.166 1.11749 254.115 1.12237L254.115 1.11749C253.924 1.11754 253.695 1.14604 253.427 1.2033C253.16 1.25104 252.916 1.32238 252.697 1.41783L252.467 2.47876L251.45 2.3637L251.707 0.60165C252.118 0.401088 252.563 0.253475 253.041 0.15797C253.519 0.0529708 253.958 1.99446e-05 254.359 0Z\"\n    fill=\"currentColor\" />\u003C/g>",{"id":13,"data":14,"type":15,"maxContentLevel":29,"version":30,"tiles":31},"17eb67d2-8125-4c42-9f3b-eb6cb7aef397",{"type":15,"title":16,"tagline":17,"description":17,"featureImageSquare":18,"baseColor":19,"emoji":20,"shapePreference":4,"allowContentSuspension":21,"allowContentEdits":21,"editorsChoice":21,"accreditations":22,"certificatePriceLevel":27,"certificationTitle":28},8,"Cybersecurity","Turn your computer into a fortress","43e6c05f-4b04-4496-af6a-f1302184fb38","#CB4747","🔒",true,[23],{"authority":24,"wasCpdTill":25,"previousCpdCreditMinutes":26},1,"2025-12-31T00:00:00Z",120,3,"Cybersecurity Essentials",9,14,[32,566,1041,1642],{"id":33,"data":34,"type":29,"maxContentLevel":37,"version":37,"orbs":38},"db8d2842-eba2-473c-840e-58a7ff9fe025",{"type":29,"title":35,"tagline":36},"The Dangerous Web","Meet the cyber threats that stalk us all",7,[39,132,170,289,420,524],{"id":40,"data":41,"type":42,"version":27,"maxContentLevel":37,"summaryPage":44,"introPage":51,"pages":58},"1476bf9f-6ead-463c-8856-1619d8b80c21",{"type":42,"title":43},2,"We're all at risk",{"id":45,"data":46,"type":27,"maxContentLevel":27,"version":24},"0361bdba-e3b9-47b5-ac42-7da03ede0eae",{"type":27,"summary":47},[48,49,50],"Everyone is a potential target for cyber attacks","Cybercrime is predicted to cost $10.5 trillion annually by 2025","That's higher than the GDP of most countries",{"id":52,"data":53,"type":54,"maxContentLevel":27,"version":24},"cf194c79-7a52-4e69-8938-0df2979d9dc2",{"type":54,"intro":55},10,[56,57],"Are you personally at risk of cyber attacks?","What could a cyber attack cost you?",[59,64,102,127],{"id":60,"data":61,"type":24,"maxContentLevel":27,"version":42},"7a36ee92-b8ee-4891-846a-c3e18479c23e",{"type":24,"contentRole":42,"markdownContent":62,"audioMediaId":63},"The digital age has transformed the world into a global village. The internet has become our home, our workplace, our playground. But the digital world is also a breeding ground for threats.\n\nThe consequences of cyber attacks can be devastating. You could wake up to find your bank account drained, your files deleted, or your photos shared online. Just like that, your entire life could be thrown into disarray.\n\n![Graph](image://f4cd0f73-6b83-4632-87a6-8aa57c4a270f \"Cybersecurity. Image: via Pexels\")\n\nYou might not think you’re at risk of this. But every person who uses the internet is a potential target for cyber attackers, just as every person who owns a home is a potential target for thieves.","f884df18-3d05-4fa9-bd1b-bf2c021bccbe",{"id":65,"data":66,"type":24,"maxContentLevel":27,"version":24,"reviews":69},"2e897e52-84cb-4462-b34b-2469ca0c5aed",{"type":24,"contentRole":42,"markdownContent":67,"audioMediaId":68},"In 2017, about a quarter of a million innocent people were hit by an attack called **WannaCry**. These people discovered a message on their laptops, declaring that all their files had been locked, and wouldn’t be released without payment.\n\nIt affected people all around the world – and it also affected businesses. As they scrambled to recover their computer systems, these businesses made combined losses of about $4 billion.\n\nMost people never got their data back. Not even the ones who paid the ransom. Can you imagine losing your entire computer? Every photo, every file, every byte.\n\n![Graph](image://44c7f996-bab8-4f8a-b699-619749407cbf \"WannaCry attack. Image: 황승환, CC BY-SA 4.0 \u003Chttps://creativecommons.org/licenses/by-sa/4.0>, via Wikimedia Commons\")","d20c5877-7a8c-4758-865f-7840b5829ff5",[70,82],{"id":71,"data":72,"type":73,"version":24,"maxContentLevel":27},"4ff7e9a5-9384-4b95-8666-09532be19753",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":74,"multiChoiceCorrect":76,"multiChoiceIncorrect":78,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6},11,[75],"What happened to most of the victims of WannaCry?",[77],"They never got their data back",[79,80,81],"They got their data back after paying a ransom","They got their data back when the police got involved","They got their data when the government got involved ",{"id":83,"data":84,"type":73,"version":24,"maxContentLevel":27},"05bf7e9c-8335-4369-aa13-1ba985712cb2",{"type":73,"reviewType":27,"spacingBehaviour":24,"collapsingSiblings":85,"multiChoiceQuestion":89,"multiChoiceCorrect":91,"multiChoiceIncorrect":93,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6,"orderAxisType":24,"orderQuestion":97,"orderItems":99},[86,87,88],"7270ec6d-c9fe-4726-83e9-7b7891f1464e","ad226d2f-46d0-41fc-8dfe-ef74d5d5f66d","cacda77f-a771-4ec8-a542-5bdae89b391e",[90],"In what year did WannaCry happen?",[92],"2017",[94,95,96],"2000","2005","2019",[98],"Put the following in order:",[100],{"label":101,"reveal":92,"sortOrder":42},"WannaCry",{"id":103,"data":104,"type":24,"maxContentLevel":37,"version":27,"reviews":107},"be33f2b7-43ef-42f8-9da3-7aeb7c316a46",{"type":24,"contentRole":42,"markdownContent":105,"audioMediaId":106},"WannaCry wasn’t an isolated incident. Cybercrime is on the rise. According to research by Cybercrime Magazine, the annual cost of cyber attacks will reach a mind-boggling figure of $10.5 trillion by 2025.\n\nTo put that into perspective: that's more than the GDP of most countries. America and China are the only nations that bring in more money than cybercrime.\n\nWith so much at stake, this phenomenon isn’t just a danger to our personal data and systems. It’s also a danger to our global economy, and even our way of life.","5da17ca0-926e-4ad9-a57b-177e7858716c",[108,115],{"id":109,"data":110,"type":73,"version":24,"maxContentLevel":27},"5c7523d1-0736-4081-9ea9-b084689d3c62",{"type":73,"reviewType":24,"spacingBehaviour":24,"activeRecallQuestion":111,"activeRecallAnswers":113},[112],"According to Cybercrime Magazine, what is the projected annual cost of cyber attacks by 2025?",[114],"$10.5 trillion",{"id":116,"data":117,"type":73,"version":27,"maxContentLevel":37},"3fe6915e-9b2f-403f-bedf-89de303027dd",{"type":73,"reviewType":27,"evolvingBehavior":27,"spacingBehaviour":24,"multiChoiceQuestion":118,"multiChoiceCorrect":120,"multiChoiceIncorrect":123,"multiChoiceMultiSelect":21,"multiChoiceRevealAnswerOption":6},[119],"Which of these countries make more money (annually) than cyber crime?",[121,122],"China","USA",[124,125,126],"Russia","Japan","UK",{"id":128,"data":129,"type":24,"maxContentLevel":27,"version":24},"ae68b727-a163-41f2-9a09-1ef8efc0cf81",{"type":24,"contentRole":42,"markdownContent":130,"audioMediaId":131},"Fortunately, there are plenty of ways to keep our computers safe. That’s the purpose of **cybersecurity** – a set of defenses that keep cyber criminals away.\n\nA computer without cybersecurity is like a house without a door. A thief could easily walk right in, then stroll out again with your belongings piled high in both arms.\n\nWe’re not just talking about passwords, here. You’ll need a lot more than that to hold back cyber attacks.\n\nAnd that’s what this pathway is here for. By the time you’re done, you’ll know exactly how to keep yourself secure.\n\n![Graph](image://1002cc12-07b9-44a2-be51-768dcec6e54d \"Locked door. Image: via Pexels\")","d348ae50-9d95-4997-8631-5e3528695e4a",{"id":133,"data":134,"type":42,"version":136,"maxContentLevel":27,"introPage":137,"pages":142},"c9daa064-a2d3-4a20-9d7b-84a8f1dc5ce0",{"type":42,"title":135},"Case study: WannaCry",4,{"id":138,"data":139,"type":54,"maxContentLevel":27,"version":24},"36684f22-a487-48a7-93b6-7ad0fc3ed247",{"type":54,"intro":140},[141],"Who was affected by WannaCry?",[143,148,153],{"id":144,"data":145,"type":24,"maxContentLevel":27,"version":136},"06f9ce81-dcf7-4160-9ec8-cdb982c5caae",{"type":24,"contentRole":42,"markdownContent":146,"audioMediaId":147},"*The following text is a fictional interview with a victim of WannaCry.*\n\n![Graph](image://aff2a2e4-77f9-4c9d-9ba4-2e4350c2c15e \" \")\n\n**TIMESTAMP 00:01:30**\\\n**Do you remember how it started?**\n\n\"I sat down at my computer, ready to start my day, and then... there it was.\n\nA ransom note, right on my screen. 'Ooops, your files have been encrypted! If you want to decrypt them, you’ll have to pay $500.'\n\nI just... I couldn't believe it. I felt this wave of panic wash over me. I didn't know what to do, who to call... I felt so helpless.\"","351fab80-41f9-4e1a-a299-46a9d3c2a850",{"id":149,"data":150,"type":24,"maxContentLevel":27,"version":24},"a717650b-18e7-46a0-8538-3ea59cfae6c4",{"type":24,"contentRole":42,"markdownContent":151,"audioMediaId":152},"**Timestamp: 00:03:11\\\nDid you recover your files?**\n\n\"No. I lost everything. My work files. My bank details. Even photos of my son as a baby.\n\nI heard that some people tried to pay the ransom, but they didn't get their data back either.\n\nI just... I never thought something like this could happen to me. The stress, the anxiety... it was a nightmare.\"","00a0c07c-3265-4e16-b258-d586ff1a8b40",{"id":154,"data":155,"type":24,"maxContentLevel":27,"version":24,"reviews":158},"875bc4c9-c838-4487-a2d9-d3232d7d2825",{"type":24,"contentRole":42,"markdownContent":156,"audioMediaId":157},"**Timestamp: 00:04:27\\\nIs there anything else you'd like to tell us?**\n\n\"You know, the biggest lesson I learned from all this is that cybersecurity isn't just for massive businesses.\n\nWe're all at risk. And I wish... I wish I'd known that sooner.\n\nSo yeah, that's what I'd like to say. Protect your data – or regret it, just like me.\"","a4313c2d-e5e5-473a-8d07-a9c0d8ca0637",[159],{"id":160,"data":161,"type":73,"version":24,"maxContentLevel":27},"3522e06c-c12a-4c6c-82d6-718dc1888058",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":162,"multiChoiceCorrect":164,"multiChoiceIncorrect":166,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6},[163],"Who was impacted by the WannaCry attack?",[165],"Both of these",[167,168,169],"Average people","Major businesses","Neither of these",{"id":171,"data":172,"type":42,"version":24,"maxContentLevel":27,"summaryPage":174,"introPage":182,"pages":188},"36857a38-880c-4033-9e12-b8c75dc61da1",{"type":42,"title":173},"Malware",{"id":175,"data":176,"type":27,"maxContentLevel":27,"version":24},"43472fba-2e4e-47b2-a8ad-af66fb6c675d",{"type":27,"summary":177},[178,179,180,181],"Viruses and worms are two types of malware","Worms can spread without user interaction","Ransomware encrypts data, spyware observes activity, adware sends out ads","Malware can also create 'zombie' computers that a hacker can control remotely",{"id":183,"data":184,"type":54,"maxContentLevel":27,"version":24},"d294f6b3-80e2-40dc-9a8a-8bc2983c031e",{"type":54,"intro":185},[186,187],"What’s the difference between a virus and a worm?","When do computers become zombies?",[189,202,219,224,241],{"id":190,"data":191,"type":24,"maxContentLevel":27,"version":24,"reviews":194},"4cf613e9-88a8-4004-8279-d6f4bd6f3f51",{"type":24,"contentRole":42,"markdownContent":192,"audioMediaId":193},"In the shadowy corners of the digital world lurks 'malicious software', or **malware**. Before learning how to defend against it, let’s find out what malware does.\n\nA common example is a computer virus. This is a malicious code or program that spreads from one computer to another, much like how a biological virus spreads from host to host.\n\n![Graph](image://e500218f-19f8-4799-a166-772b347a10c7 \"Biological virus. Image: via Pexels\")\n\nA Trojan is a type of virus. It’s named after the legend of the Trojan horse. A Trojan masquerades as a regular file, like an email attachment or an update – but when a user innocently clicks that file, a virus installs instead.\n\nOnce it gets inside, a virus can unleash its malicious payload, just like all those soldiers hidden in the horse. This payload might steal important data, corrupt your files, or cause other kinds of damage instead.","3c823c84-1a08-4d95-b6f3-267841af2d96",[195],{"id":196,"data":197,"type":73,"version":24,"maxContentLevel":27},"e116e445-2788-44a6-8b27-cee64e6562a8",{"type":73,"reviewType":24,"spacingBehaviour":24,"activeRecallQuestion":198,"activeRecallAnswers":200},[199],"How would you describe a computer virus?",[201],"A malicious program that spreads from one computer to another",{"id":203,"data":204,"type":24,"maxContentLevel":27,"version":24,"reviews":207},"caf4ac61-e0a8-4823-906c-ea7b8e7987b3",{"type":24,"contentRole":42,"markdownContent":205,"audioMediaId":206},"While viruses require a user to actually click on something – like pressing ‘install’ on a well-disguised Trojan – **worms** are another type of malware that can spread without user interaction.\n\n![Graph](image://b6fc2cb6-9c5c-4141-beb1-de2348cd5bbe \"Biological worm. Image: via Pexels\")\n\nInstead, they slither into systems automatically, exploiting the cracks in your defenses. Their ability to multiply and spread automatically means that worms are often hard to stop.\n\nImagine heading to a cafe, and connecting to the public WiFi. There might be a worm there, lying in wait. And as soon as you join, it slips inside your system.\n\nA notorious worm, by the name of ILOVEYOU, spread itself via email. Whenever it infected a person’s system, it corrupted the hard drive, then automatically forwarded itself on to everyone in that person’s address book.","9b9bdaa8-cc02-4b68-9b89-53e29e760141",[208],{"id":209,"data":210,"type":73,"version":24,"maxContentLevel":27},"260716fb-5b36-4903-82ba-60f022834564",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":211,"multiChoiceCorrect":213,"multiChoiceIncorrect":215,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6},[212],"How did the ILOVEYOU worm spread?",[214],"Via email",[216,217,218],"Via USB","Via Wi-Fi","Via Facebook",{"id":220,"data":221,"type":24,"maxContentLevel":27,"version":24},"67cb8825-7425-4bcf-bc48-937d959cb97c",{"type":24,"contentRole":42,"markdownContent":222,"audioMediaId":223},"**Ransomware** is another type of malware. It might infect a system in a similar way to a virus or a worm – but once it gets inside, it performs a specific set of behaviors.\n\nIt starts by encrypting all of your files, effectively locking you out of your own data. After that, it will demand a ransom payment, promising to restore the encrypted files as soon as the ransom is paid.\n\nRansomware doesn’t discriminate. Anyone can find themselves at risk. For example, during the WannaCry outbreak in 2017, the UK’s National Health Service (NHS) was attacked.\n\nAs many as 70,000 NHS devices were affected. In some places, patients were turned away, as hospitals scrambled to regain some kind of control.\n\n![Graph](image://e5786385-69a0-44e4-a82b-7e2b3544091e \"NHS computer. Image: via Pexels\")","2234c6c0-7d11-435b-8990-9c7fe298096c",{"id":225,"data":226,"type":24,"maxContentLevel":27,"version":24,"reviews":229},"07d700e9-4bc2-4c97-a3ef-a2dbd8399094",{"type":24,"contentRole":42,"markdownContent":227,"audioMediaId":228},"**Spyware** is another type of malware. After installing itself, it lurks in the shadows of a computer system, spying on user activity. It might collect information, like passwords or bank numbers, then send it back to the person who launched the attack.\n\nThen there’s **adware**. After infecting a computer, it will bombard you with adverts, turning your entire digital system into a nightmare full of pop-ups, banners and clutter.\n\nThe Zlob Trojan, which was first discovered in 2005, is an example of a computer virus that combines elements of both spyware and adware. It used pop-up ads to trick users into downloading fake security software, which then collected their personal data.","877fbeec-b79f-4f7f-8e0c-c1a6a90a232c",[230],{"id":86,"data":231,"type":73,"version":24,"maxContentLevel":27},{"type":73,"reviewType":27,"spacingBehaviour":24,"collapsingSiblings":232,"multiChoiceQuestion":233,"multiChoiceCorrect":235,"multiChoiceIncorrect":236,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6,"orderAxisType":24,"orderQuestion":237,"orderItems":238},[83,87,88],[234],"In what year was the Zlob Trojan discovered?",[95],[94,92,96],[98],[239],{"label":240,"reveal":95,"sortOrder":24},"Zlob Trojan",{"id":242,"data":243,"type":24,"maxContentLevel":27,"version":24,"reviews":246},"b8848b90-7dc2-47eb-8914-d3d080d4963d",{"type":24,"contentRole":42,"markdownContent":244,"audioMediaId":245},"Malware can also be used to turn a computer into a **zombie**. A zombie computer can be controlled remotely by another person, almost as though they’re sitting in the room alongside you.\n\n![Graph](image://40b6f808-b0c1-426d-95d8-a70c58559896 \"Zombie. Image: via Pexels\")\n\nThis person might command your computer to send out emails, each one containing links to more malware. Or they might use it to store some illegal files, which they don’t want to keep on their own personal machine.\n\nCryptojacking is another threat associated with zombie computers. It uses your computer as a mining rig for cryptocurrency, which slows down your system and increases your energy bills.\n\nIn other words, there are lots of different types of malware out there. From viruses to zombies, it’s easy to see why the internet is such a dangerous place.","8785574a-e44e-4794-9a91-088c8e15a5c9",[247,265,282],{"id":248,"data":249,"type":73,"version":24,"maxContentLevel":27},"2180003a-c79b-4a05-93fd-69b15a2a6aa9",{"type":73,"reviewType":250,"spacingBehaviour":24,"matchPairsQuestion":251,"matchPairsPairs":253,"matchPairsShowExamples":6},6,[252],"Match the pairs below:",[254,256,259,262],{"left":173,"right":255,"direction":27},"General term for malicious software",{"left":257,"right":258,"direction":27},"Trojan","Pretends to be a regular file",{"left":260,"right":261,"direction":27},"Worm","Spreads without user interaction",{"left":263,"right":264,"direction":27},"Zombie","Remote-controlled computer",{"id":266,"data":267,"type":73,"version":24,"maxContentLevel":27},"6fe33927-2595-4bb0-b066-bcdc9d33ee0b",{"type":73,"reviewType":250,"spacingBehaviour":24,"matchPairsQuestion":268,"matchPairsPairs":269,"matchPairsShowExamples":6},[252],[270,273,276,279],{"left":271,"right":272,"direction":27},"Ransomware","Encrypts your files",{"left":274,"right":275,"direction":27},"Spyware","Watches your activity",{"left":277,"right":278,"direction":27},"Adware","Sends you pop-ups",{"left":280,"right":281,"direction":27},"Hardware","None of these",{"id":283,"data":284,"type":73,"version":24,"maxContentLevel":27},"4f2cccb1-0ebe-4a84-91a0-7f54ac2cf43f",{"type":73,"reviewType":24,"spacingBehaviour":24,"activeRecallQuestion":285,"activeRecallAnswers":287},[286],"What does cryptojacking do to a computer?",[288],"It uses it as a mining rig for cryptocurrency",{"id":290,"data":291,"type":42,"version":136,"maxContentLevel":27,"summaryPage":293,"introPage":301,"pages":307},"626f008b-c0b2-4b8a-9ead-e03717d4e4fd",{"type":42,"title":292},"Hacking",{"id":294,"data":295,"type":27,"maxContentLevel":27,"version":24},"e5c033c1-8177-473e-8df2-7db29cd5c226",{"type":27,"summary":296},[297,298,299,300],"White hat hackers use their skills to help people","Black hat hackers use their skills to harm people","Brute forcing is a method of guessing passwords by trying every possible combination","Hackers can also use physical attacks (like shoulder surfing) to steal someone's passwords",{"id":302,"data":303,"type":54,"maxContentLevel":27,"version":24},"0ae5d7db-7513-4221-8751-287d1240b74e",{"type":54,"intro":304},[305,306],"What’s the difference between black hats and white hats?","Why should you look over your shoulder?",[308,344,361,386,403],{"id":309,"data":310,"type":24,"maxContentLevel":27,"version":24,"reviews":313},"338b4396-c4aa-447b-bc21-103a6cb191ab",{"type":24,"contentRole":42,"markdownContent":311,"audioMediaId":312},"Malware doesn’t just pop into existence, or evolve of its own accord. Every piece of malicious software was made by a real-life person. By someone who wants to exploit the weaknesses of other online users.\n\nCollectively, these malware-makers are often referred to as **hackers**. They’re talented and devious, and use their skills to access other people’s machines. Once they’re in, they’ll set up ransomware, or spyware, or whatever else they want to.\n\nNot all hackers are bad. **White hat hackers** are individuals who use their skills for good. They identify weaknesses in computer systems, then help to fix those weaknesses before malware finds its way in.\n\nBut **black hat hackers** are a menace. If your computer is a fortress, then black hat hackers are the invading army who want to force their way inside.\n\n![Graph](image://e4b9b42f-d6e4-4b7f-bef0-57b222ca6303 \"Hacker. Image: via Pexels\")","f0428455-ebdd-4b5a-b824-bb001e4e5ddc",[314,333],{"id":315,"data":316,"type":73,"version":24,"maxContentLevel":27},"687ff6f5-3735-403c-a31b-67710bf5fdbc",{"type":73,"reviewType":27,"spacingBehaviour":24,"collapsingSiblings":317,"multiChoiceQuestion":321,"multiChoiceCorrect":323,"multiChoiceIncorrect":325,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6,"matchPairsQuestion":329,"matchPairsPairs":330},[318,319,320],"3231fa19-b658-41db-91c3-08660fc0767f","940e6c99-cb4e-4112-8e2c-adc9607172c8","5593bd72-109e-4b8a-91a4-432c79099655",[322],"Which of these is a good description of white hat hacking?",[324],"Using hacking skills to help people",[326,327,328],"Using hacking skills to harm people","A targeted phishing attack","A voice-based phishing attack",[252],[331],{"left":332,"right":324,"direction":27},"White hat hacking",{"id":318,"data":334,"type":73,"version":24,"maxContentLevel":27},{"type":73,"reviewType":27,"spacingBehaviour":24,"collapsingSiblings":335,"multiChoiceQuestion":336,"multiChoiceCorrect":338,"multiChoiceIncorrect":339,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6,"matchPairsQuestion":340,"matchPairsPairs":341},[315,319,320],[337],"Which of these is a good description of black hat hacking?",[326],[324,327,328],[252],[342],{"left":343,"right":326,"direction":27},"Black hat hacking",{"id":345,"data":346,"type":24,"maxContentLevel":27,"version":24,"reviews":349},"1d081ba5-f499-4f12-ae2f-9d635aa5bd0b",{"type":24,"contentRole":42,"markdownContent":347,"audioMediaId":348},"When a black hat hacker develops a piece of malicious software, they’ll sometimes take a scattergun approach, just tossing that malware out into the world and waiting for the code to infect any systems it touches.\n\nThis approach was used for famous attacks like ILOVEYOU (2000) and WannaCry (2017). These worms infected millions of computers as they spread across the internet at random.\n\n![Graph](image://3f1572ed-b4bc-4e72-ac61-ea4ed13baf5e \"ILOVEYOU worm. Mario23, Public domain, via Wikimedia Commons\")\n\nAt other times, a hacker will take a much more targeted approach. Instead of attacking at random, they’ll specifically identify a person or business that they want their malware to attack.\n\nIt’s the difference between poisoning a local well, and infecting anyone who happens to drink there, versus breaking into a target’s house, and specifically poisoning their cup.","9dbfaf0a-eacd-4354-bd89-008b476c2b61",[350],{"id":87,"data":351,"type":73,"version":24,"maxContentLevel":27},{"type":73,"reviewType":27,"spacingBehaviour":24,"collapsingSiblings":352,"multiChoiceQuestion":353,"multiChoiceCorrect":355,"multiChoiceIncorrect":356,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6,"orderAxisType":24,"orderQuestion":357,"orderItems":358},[83,86,88],[354],"In what year was the ILOVEYOU worm released?",[94],[95,92,96],[98],[359],{"label":360,"reveal":94,"sortOrder":4},"ILOVEYOU",{"id":362,"data":363,"type":24,"maxContentLevel":27,"version":42,"reviews":366},"3fe6946a-9c56-40a3-8c90-a7b0f4f9d05b",{"type":24,"contentRole":42,"markdownContent":364,"audioMediaId":365},"When a hacker targets a specific user, they’ll often try to access their system by guessing that user’s password. A single password can protect a wealth of sensitive data, from social media to online banking.\n\n**Brute forcing** is a hacking technique that involves a hacker trying every combination of letters and symbols until they stumble across a user’s private password. It's like a persistent burglar trying every combination on a lock until a door eventually opens.\n\nIt's a painstaking process, which requires a lot of time and energy, especially for complex passwords. The more complex the password, the more combinations there are to try, and the longer the process takes.\n\nBut for simpler passwords, brute forcing can be quick and efficient. This approach is often an effective way for hackers to enter your system.","d7c19fcf-c1c2-468f-8aa8-50bdeeef24d6",[367],{"id":368,"data":369,"type":73,"version":42,"maxContentLevel":27},"b9751644-11f7-4692-a131-fc5ea8d4ab39",{"type":73,"reviewType":27,"spacingBehaviour":24,"collapsingSiblings":370,"multiChoiceQuestion":374,"multiChoiceCorrect":376,"multiChoiceIncorrect":378,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6,"matchPairsQuestion":382,"matchPairsPairs":383},[371,372,373],"37a710b3-9167-4e0c-bedd-f51ea99f7ecb","3722c35c-5052-4c86-8764-43dc8438562b","4e6267bf-cd66-4c21-969b-3e3a2221e9bd",[375],"Which of these best describes brute forcing?",[377],"Used to crack passwords",[379,380,381],"Used to eavesdrop on streams of data","Used to steal information in public places","Used to trick people into clicking links",[252],[384],{"left":385,"right":377,"direction":27},"Brute forcing",{"id":387,"data":388,"type":24,"maxContentLevel":27,"version":136,"reviews":391},"44306515-ab94-4ea3-8f6f-fe75e8c4bd6b",{"type":24,"contentRole":42,"markdownContent":389,"audioMediaId":390},"Black hat hackers also use an approach called a **man-in-the-middle** (MitM) attack. In this type of attack, the hacker doesn’t enter a system directly; instead, they target streams of data as they flow from one system to another.\n\nFor example, two users might be sending emails back and forth to each other. The hacker latches onto these emails, intercepting the communication without either of the users knowing.\n\nFrom there, the hacker can eavesdrop on the private conversation – an invisible stranger listening in to everything those people have to say. They’ll be hoping to overhear some important information, like a clue to your passwords or bank details.\n\nSometimes, a hacker can actually manipulate the nature of a private conversation, tweaking emails as they pass. For example, they might attach a Trojan to an innocent email you just sent to one of your friends.\n\n![Graph](image://f031fe16-3e45-4f09-8b52-887b21e76292 \"Trudy is the middle man. Image: OSeveno, adaptation of File:Man in the middle attack.svg, created by User:Miraceti, CC BY-SA 3.0 \u003Chttps://creativecommons.org/licenses/by-sa/3.0>, via Wikimedia Commons\")","22a73512-3e77-4d6d-98ae-f49b3ccba370",[392],{"id":371,"data":393,"type":73,"version":42,"maxContentLevel":27},{"type":73,"reviewType":27,"spacingBehaviour":24,"collapsingSiblings":394,"multiChoiceQuestion":395,"multiChoiceCorrect":397,"multiChoiceIncorrect":398,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6,"matchPairsQuestion":399,"matchPairsPairs":400},[368,372,373],[396],"What's the purpose of man-in-the-middle attacks?",[379],[377,380,381],[252],[401],{"left":402,"right":379,"direction":27},"Man-in-the-middle",{"id":404,"data":405,"type":24,"maxContentLevel":27,"version":24,"reviews":408},"4547e4aa-7d90-4e46-9365-8d9b1fbdc3ce",{"type":24,"contentRole":42,"markdownContent":406,"audioMediaId":407},"Some hackers will also use **physical attacks** to gain access to a user’s system. For example, they might upload a piece of malware onto a USB stick, then deliberately leave that USB stick lying around.\n\nSomeone might find it in a cafe or an office. Out of curiosity, they plug the USB into their laptop. Instantly, the malware flows into the system, bypassing any passwords along the way.\n\n**Shoulder surfing** is another type of physical attack. It’s simple but effective: in a public place, like a cafe or a library, a hacker watches a user's screen over their shoulder. When the user types in their password, the hacker notes down the keys.\n\nATM pin theft is a common example of shoulder surfing. The attacker waits in line behind a target, like a predator watching its prey. When the target enters their pin number, the attacker suddenly has access to that person’s accounts.\n\n![Graph](image://bf6f1509-216b-4223-adaf-8000e49fb2e3 \"Shoulder surfing. Image: via Pexels\")","1448a4ec-6305-4f7e-9a7f-dc03391c8b8c",[409],{"id":372,"data":410,"type":73,"version":24,"maxContentLevel":27},{"type":73,"reviewType":27,"spacingBehaviour":24,"collapsingSiblings":411,"multiChoiceQuestion":412,"multiChoiceCorrect":414,"multiChoiceIncorrect":415,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6,"matchPairsQuestion":416,"matchPairsPairs":417},[368,371,373],[413],"Which of these is the main purpose of shoulder surfing?",[380],[377,379,381],[252],[418],{"left":419,"right":380,"direction":27},"Shoulder surfing",{"id":421,"data":422,"type":42,"version":24,"maxContentLevel":27,"summaryPage":424,"introPage":432,"pages":438},"20dcd046-648e-4319-9080-48f9077a8600",{"type":42,"title":423},"Phishing",{"id":425,"data":426,"type":27,"maxContentLevel":27,"version":24},"2c3fd2ed-22d5-4723-a110-9f5a6d71b457",{"type":27,"summary":427},[428,429,430,431],"Social engineering manipulates emotions as a way to gain access to systems","Phishing is when hackers pretend to be someone else in order to steal your data","Spear-phishing is a more personalized form of phishing","AI vishing uses AI to mimic voices, making scams even more believable",{"id":433,"data":434,"type":54,"maxContentLevel":27,"version":24},"27cc7516-a1d3-4d3d-b3ce-9ebd29f771bd",{"type":54,"intro":435},[436,437],"What’s the difference between phishing and spear-phishing?","Should you trust a familiar voice?",[439,452,479,496],{"id":440,"data":441,"type":24,"maxContentLevel":27,"version":24,"reviews":444},"ef148292-1c68-4c6d-a88a-100014334f6a",{"type":24,"contentRole":42,"markdownContent":442,"audioMediaId":443},"Hackers are often masters of computer programming. You can’t write an effective piece of malware without knowing a lot about code. But they also have another talent: **social engineering**.\n\nSocial engineering is a catch-all term for manipulative tactics that play on our emotions, and trick us into letting hackers enter our private systems.\n\nLeaving a USB stick lying around is an example of this. It plays on human curiosity – how many unsuspecting people would be tempted to plug that USB in, just to take a peek at what’s on there?\n\n![Graph](image://cc745826-6888-4243-91c7-10bd03b07ce7 \"USB stick. Image: via Pexels\")\n\nOr maybe a hacker will take a different approach, using a childish looking USB with unicorns printed on the side. This time, they’re playing on pity, or guilt. You want to return this USB to the child who must have lost it – so you plug it in, in the hope of finding some contact information inside.","6dca33da-af86-4481-9201-06ac3fc6e592",[445],{"id":446,"data":447,"type":73,"version":24,"maxContentLevel":27},"8f03eb6c-1adb-4c51-a4b5-9c7ff1297e92",{"type":73,"reviewType":24,"spacingBehaviour":24,"activeRecallQuestion":448,"activeRecallAnswers":450},[449],"What term describes the manipulative tactics that hackers use to trick people?",[451],"Social engineering",{"id":453,"data":454,"type":24,"maxContentLevel":27,"version":24,"reviews":457},"edc7c37e-f67f-4077-9114-8f38393caf59",{"type":24,"contentRole":42,"markdownContent":455,"audioMediaId":456},"The most common type of social engineering is something known as **phishing**. This is when hackers contact people while pretending to be someone they’re not.\n\nFor example, they might send you an urgent email posing as your bank. The email warns you that there’s been a security breach, and says that everyone should check their account. Nervous, you decide to follow the link, and try to log in–\n\nThe link was fake. You just typed your password into a decoy webpage, and the hacker now knows your details. Or maybe the link was a Trojan. When you clicked it, a virus installed on your personal system.\n\n![Graph](image://bac283f0-9e78-44fc-8ba7-8ac546017a91 \"Phishing email. Image: gmcgcc, CC BY-SA 4.0 \u003Chttps://creativecommons.org/licenses/by-sa/4.0>, via Wikimedia Commons\")\n\nEvery day, a staggering 3.4 billion phishing emails are sent out by hackers all across the world. They pose as banks and businesses, as medical professionals, as family members and friends.","b276e3c3-8e55-4caa-802d-b14c76e15116",[458,468],{"id":373,"data":459,"type":73,"version":24,"maxContentLevel":27},{"type":73,"reviewType":27,"spacingBehaviour":24,"collapsingSiblings":460,"multiChoiceQuestion":461,"multiChoiceCorrect":463,"multiChoiceIncorrect":464,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6,"matchPairsQuestion":465,"matchPairsPairs":466},[368,371,372],[462],"Which of these is one of the main purposes of phishing?",[381],[377,379,380],[252],[467],{"left":423,"right":381,"direction":27},{"id":469,"data":470,"type":73,"version":24,"maxContentLevel":27},"e1aac8b4-ccc5-4646-ba10-1e41153a4ddd",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":471,"multiChoiceCorrect":473,"multiChoiceIncorrect":475,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6},[472],"What is the daily estimated number of phishing emails sent out by hackers worldwide?",[474],"3.4 billion",[476,477,478],"1.4 billion","2.4 billion","4.4 billion",{"id":480,"data":481,"type":24,"maxContentLevel":27,"version":24,"reviews":484},"91a9635a-541d-44d6-98e9-ddabbde9a6f2",{"type":24,"contentRole":42,"markdownContent":482,"audioMediaId":483},"A lot of phishing attacks are generic: the same email is sent to thousands of people, with hackers hoping that a few of these people will bite. But sometimes, attacks are targeted. This approach is known as **spear-phishing**.\n\nIn spear-phishing, a hacker will research their victim, and carefully tailor their communication to make it more believable. For example, they might find the victim’s social media page, and discover that their partner’s name is Jake.\n\nThe hacker can proceed to email the victim from an unknown address: “Hey, it’s Jake, I just lost my phone so I’m borrowing a friend’s. Can you send £20 to their bank account for me? They said they’d help me pay for a taxi.”\n\nThe personalized nature of spear-phishing makes the deception more convincing. If you received this email, would you fall for it? A lot of people would.","f7739ccf-c1ce-49fa-a5f6-de6a76b6fada",[485],{"id":319,"data":486,"type":73,"version":24,"maxContentLevel":27},{"type":73,"reviewType":27,"spacingBehaviour":24,"collapsingSiblings":487,"multiChoiceQuestion":488,"multiChoiceCorrect":490,"multiChoiceIncorrect":491,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6,"matchPairsQuestion":492,"matchPairsPairs":493},[315,318,320],[489],"Which of these best describes spear-phishing?",[327],[324,326,328],[252],[494],{"left":495,"right":327,"direction":27},"Spear-phishing",{"id":497,"data":498,"type":24,"maxContentLevel":27,"version":24,"reviews":501},"10fcc46e-1336-4ce1-972f-f020c8351bd0",{"type":24,"contentRole":42,"markdownContent":499,"audioMediaId":500},"Phishing isn’t limited to emails. Hackers might also target people via text messages, social media, or even phone calls. To make things worse, these techniques are evolving, becoming more advanced and more dangerous with every passing year.\n\nA new and potentially devastating development is AI voice phishing, or **vishing**. This technique uses artificial intelligence to mimic the voice of a trusted person, making the scam a lot more convincing.\n\nIn 2019, an employee at a UK energy firm received a phone call from his boss. On the call, he was told to transfer a lump of company money to the account of a Hungarian supplier.\n\nThe employee did as he was told – but later found out that the phone call wasn’t from his boss. Instead, a hacker had used deepfake technology to mimic the boss’ voice.\n\n![Graph](image://3646b522-1b6c-47fc-93cf-b93c4e0bd1cb \"Suspicious phone call. Image: via Pexels\")","66c1ab0b-0906-4413-a7fb-cd5be8fc35b3",[502,513],{"id":320,"data":503,"type":73,"version":24,"maxContentLevel":27},{"type":73,"reviewType":27,"spacingBehaviour":24,"collapsingSiblings":504,"multiChoiceQuestion":505,"multiChoiceCorrect":507,"multiChoiceIncorrect":508,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6,"matchPairsQuestion":509,"matchPairsPairs":510},[315,318,319],[506],"Which of these best describes vishing?",[328],[324,326,327],[252],[511],{"left":512,"right":328,"direction":27},"Vishing",{"id":88,"data":514,"type":73,"version":24,"maxContentLevel":27},{"type":73,"reviewType":27,"spacingBehaviour":24,"collapsingSiblings":515,"multiChoiceQuestion":516,"multiChoiceCorrect":518,"multiChoiceIncorrect":519,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6,"orderAxisType":24,"orderQuestion":520,"orderItems":521},[83,86,87],[517],"In what year was an employee at a UK energy firm caught out by a deepfake vishing attack?",[96],[94,95,92],[98],[522],{"label":523,"reveal":96,"sortOrder":27},"Deepfake vishing at UK energy firm",{"id":525,"data":526,"type":42,"version":42,"maxContentLevel":27,"introPage":528,"pages":533},"a024e0db-aeb8-4f8a-ba43-0e97ecf60c7e",{"type":42,"title":527},"Case study: Phishing",{"id":529,"data":530,"type":54,"maxContentLevel":27,"version":24},"79666fee-42ae-4f3b-a9be-8e50b31caec2",{"type":54,"intro":531},[532],"What do phishing emails actually look like?",[534,539,544,549],{"id":535,"data":536,"type":24,"maxContentLevel":27,"version":42},"fe78dd81-3c2b-47aa-9e3c-9009f2c4e5c8",{"type":24,"contentRole":42,"markdownContent":537,"audioMediaId":538},"*The following text is a fictional example of a chain of phishing emails.*\n\n**Subject: URGENT!! Account Verification Required\\\nDate & Time: 12/01/2024, 10:33 AM**\n\nDear Mo,\n\nWe've noticed suspicious activity on your bank account. To keep your account secure, we need you to verify your account details.\n\nPlease CLICK HERE to verify your account. Remember, never share your verification code with anyone.\n\nBest,\\\nAlex","25f73cb4-8411-4c94-837a-57047f80527b",{"id":540,"data":541,"type":24,"maxContentLevel":27,"version":24},"693b6e07-5fca-476e-945d-62752cf31530",{"type":24,"contentRole":42,"markdownContent":542,"audioMediaId":543},"**Subject: RE: URGENT!! Account Verification Required\\\nDate & Time: 12/01/2024, 11:08 AM**\n\nDear Alex,\n\nI've just verified my account details as requested. Can you please confirm that my account is now secure?\n\nThank you,\\\nMo","b3f0d453-377a-4335-8e58-d6a2c2d96fcf",{"id":545,"data":546,"type":24,"maxContentLevel":27,"version":24},"fac8fe08-28cf-4248-acaa-ca42617454bb",{"type":24,"contentRole":42,"markdownContent":547,"audioMediaId":548},"**Subject: RE: URGENT!! Account Verification Required\\\nDate & Time: 12/01/2024, 11:15 AM**\n\nDear Mo,\n\nThank you for your prompt response. We've received your account details and your account is now secure. We appreciate your cooperation.\n\nBest,\\\nAlex","b479eb7c-f4fe-4c6b-8aa8-cb2385417832",{"id":550,"data":551,"type":24,"maxContentLevel":27,"version":24,"reviews":554},"57e668b2-ead2-4b00-9d45-0a84f3ea9a65",{"type":24,"contentRole":42,"markdownContent":552,"audioMediaId":553},"**Subject: RE: URGENT!! Account Verification Required\\\nDate & Time: 12/01/2024, 11:27 AM**\n\nDear Alex,\n\nWhat's happening? I just got a message saying a large withdrawal has been made from my account. This wasn't me. Can you please help?\n\nBest,\\\nMo","e90c8d4d-3062-4464-9c79-ac4f5fff33e8",[555],{"id":556,"data":557,"type":73,"version":24,"maxContentLevel":27},"a8eb51b6-1e2b-428c-8a8a-500d18e802a1",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":558,"multiChoiceCorrect":560,"multiChoiceIncorrect":562,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6},[559],"Why might a spear phishing email be more effective than regular phishing?",[561],"Personal details make it more believable",[563,564,565],"Accurate spelling makes it more believable","Sophisticated language makes it more believable","Actually, regular phishing is usually more effective",{"id":567,"data":568,"type":29,"maxContentLevel":27,"version":37,"orbs":571},"aea51e6b-3e60-4a2a-80ed-7721ed13a16d",{"type":29,"title":569,"tagline":570},"Building a Fortress","Learn how to secure your personal systems",[572,679,758,851,950],{"id":573,"data":574,"type":42,"version":42,"maxContentLevel":27,"summaryPage":576,"introPage":584,"pages":590},"b4be0ebf-58f7-4ced-b50c-7469b53bf6dd",{"type":42,"title":575},"Passwords",{"id":577,"data":578,"type":27,"maxContentLevel":27,"version":24},"bd24c8c8-0409-4b00-a9ba-128b0e7dd53b",{"type":27,"summary":579},[580,581,582,583],"Passwords are your first line of defense against hackers","Strong passwords use non-sequential numbers, non-dictionary words, capital letters and symbols","Password managers help you remember different passwords for each of your accounts","Multi-factor authentication makes your security setup even stronger",{"id":585,"data":586,"type":54,"maxContentLevel":27,"version":24},"b23d55e2-3a9b-4275-bcde-76f634241842",{"type":54,"intro":587},[588,589],"What are the key elements of a strong password?","How does multi-factor authentication enhance the security of your passwords?",[591,596,624,629,644],{"id":592,"data":593,"type":24,"maxContentLevel":27,"version":24},"16756e33-9c3e-4327-8e36-327f20041902",{"type":24,"contentRole":42,"markdownContent":594,"audioMediaId":595},"It's useful to think of the digital world as a battlefield. Hackers are the enemy, always on the prowl, armed with devious malware. And your system is a fortress, carefully built to keep that malware out.\n\nThe first line of defense in your digital fortress should be **passwords**. They're like secret keys that open the fortress gates. These keys let you come and go as you please. But the hackers? They can't get in.\n\nAt least, they can't get in if the passwords are strong enough. Often, that isn't the case. A recent report found that 3 in 4 people use passwords that are easy for enemy hackers to crack.\n\n![Graph](image://12807d7b-445a-4040-b23f-45e1cc660a5d \"Log-in screen. Image: the Mediawiki developers, Public domain, via Wikimedia Commons\")","fced70a8-ba40-434c-8bbb-204621c693bd",{"id":597,"data":598,"type":24,"maxContentLevel":27,"version":24,"reviews":601},"f2e959ad-fa49-464d-a61d-7406bf8ffa30",{"type":24,"contentRole":42,"markdownContent":599,"audioMediaId":600},"When hackers try to brute force a password, they'll start by guessing common words and sequences of numbers, like 'password' or '123'. If you don't use any of those in your password, it will take significantly longer to crack.\n\n![Graph](image://a63676f9-7769-406f-bd26-370fc3a14c62 \"Don't use this as your password. Image: via Pexels\")\n\nInstead, use groups of **non-sequential numbers** (e.g. 254 or 778453), and even some made-up **non-dictionary words** (e.g. flergle, or blumpblum, or cgshtbeep). Throw in some random **capital letters**, and some **random symbols**, to make the brute forcing even harder.\n\nTo put all this into perspective: a simple password, like 'octopus', could take less than a second to brute force. A better password, like 'Octopus345', could take months. And the best passwords of all, like 'FhemLY!@464' could take thousands of years to crack.","9252ec57-f128-4351-a641-a670bba9bfd0",[602,613],{"id":603,"data":604,"type":73,"version":24,"maxContentLevel":27},"eeafda24-b5b0-4979-a53b-f71895407e49",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":605,"multiChoiceCorrect":607,"multiChoiceIncorrect":609,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6},[606],"A friend asks you: \"Is it better to include a special character, or a number, to make my password stronger?\"",[608],"How about both?",[610,611,612],"A special character","A number","Just stick to letters",{"id":614,"data":615,"type":73,"version":24,"maxContentLevel":27},"2c6a039a-1109-4e2b-a844-c955974cc2ea",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":616,"multiChoiceCorrect":618,"multiChoiceIncorrect":621,"multiChoiceMultiSelect":21,"multiChoiceRevealAnswerOption":6},[617],"Which of these make passwords stronger?",[619,620],"Non-sequential numbers","Non-dictionary words",[622,623],"Sequential numbers","Dictionary words",{"id":625,"data":626,"type":24,"maxContentLevel":27,"version":24},"da51ce0c-289a-4dc2-908e-5d4fbdf8fe0a",{"type":24,"contentRole":42,"markdownContent":627,"audioMediaId":628},"This doesn't mean that a password like 'FhemLY!@464' is unbreakable. Brute forcing techniques are getting better every year, with constant advancements in computing power, not to mention the help of AI.\n\nAnd bruteforcing isn't the only way that a hacker can get your password. Imagine, for example, a phishing email that tricks you into entering your password on a hacker's decoy website.\n\nOr a man-in-the-middle attack, where a hacker eavesdrops on your computer activity, and catches you sharing your password details with a friend.","3ae67ba2-d36d-4aca-8dd6-649b1a5c6903",{"id":630,"data":631,"type":24,"maxContentLevel":27,"version":24,"reviews":634},"65b014d9-be10-40a5-9d9f-e85057967ef6",{"type":24,"contentRole":42,"markdownContent":632,"audioMediaId":633},"Ultimately, even the strongest passwords are never entirely secure. Because of that, it's always good to use different passwords for all your different accounts.\n\nThat way, if a hacker got hold of one password, they'd only have access to one part of your system. It's like making sure to put a different lock on every room in your fortress.\n\nRemembering lots of different, complex passwords can be daunting. But there's a solution to this: **password managers**. These digital vaults, like 1Password or Bitwarden, let you store all your different passwords. They're hyper-secure, and help you to safely keep track.","bea829b6-8481-433d-8b2c-595b4cb2ab51",[635],{"id":636,"data":637,"type":73,"version":24,"maxContentLevel":27},"cde5378d-e943-4872-b573-373394e10b1b",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":638,"multiChoiceCorrect":640,"multiChoiceIncorrect":642,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6},[639],"Should you use a password manager?",[641],"Yes - It lets you securely store all your passwords",[643],"No - It's unsafe to store all your passwords in one place",{"id":645,"data":646,"type":24,"maxContentLevel":27,"version":42,"reviews":649},"e078e23d-5f76-4403-80d1-c1c1db6a25d9",{"type":24,"contentRole":42,"markdownContent":647,"audioMediaId":648},"To elevate your passwords even further, you should always make sure to use some kind of **multi-factor authentication (MFA)**.\n\nMFA is an enhanced system that checks your identity via a series of different steps. It might ask you for a password, but also a fingerprint scan, or a security question, or a confirmation code sent to your mobile.\n\n![Graph](image://6b7fb30a-0e89-48ce-8652-2c0833fe1b85 \"Mobile phone. Image: via Pexels\")\n\nIt's unlikely that a hacker would manage to access all of these things at once. And that makes MFA an extremely effective deterrent.\n\nAccording to a report by Microsoft, using MFA can block a staggering 99.9% of cyber attacks. In other words, it's an essential feature for your high-security fortress.","436d6bbd-265a-44be-89cb-d27ca3728708",[650,661],{"id":651,"data":652,"type":73,"version":24,"maxContentLevel":27},"ff30150c-c00e-4c80-8846-08e844a3f30a",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":653,"multiChoiceCorrect":655,"multiChoiceIncorrect":657,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6},[654],"According to a report by Microsoft, which of these is able to block 99.9% of cyber attacks?",[656],"Multi-factor authentication",[658,659,660],"Strong passwords","End-to-end encryption","Antivirus software",{"id":662,"data":663,"type":73,"version":42,"maxContentLevel":27},"ba6d6ffe-2f64-4973-9960-57948925b356",{"type":73,"reviewType":250,"spacingBehaviour":24,"matchPairsQuestion":664,"matchPairsPairs":666,"matchPairsShowExamples":6},[665],"How long would these passwords take to brute force?",[667,670,673,676],{"left":668,"right":669,"direction":27},"kinnulover","Minutes",{"left":671,"right":672,"direction":27},"Kinnul0ver","Hours",{"left":674,"right":675,"direction":27},"K!nnul0ver","Years",{"left":677,"right":678,"direction":27},"K!nnul@ver3","Centuries",{"id":680,"data":681,"type":42,"version":27,"maxContentLevel":27,"summaryPage":683,"introPage":691,"pages":697},"8479e7a6-bd33-4a8b-941f-28b902930af2",{"type":42,"title":682},"Updates",{"id":684,"data":685,"type":27,"maxContentLevel":27,"version":24},"5da65d8d-21e5-4e85-aac7-1822a24413f4",{"type":27,"summary":686},[687,688,689,690],"A vulnerability is a weakness or error in a piece of software","Software updates patch these vulnerabilities, keeping your system safe","Auto-updates are a reliable way to make sure your software stays updated","Only ever download updates from official, trustworthy sources",{"id":692,"data":693,"type":54,"maxContentLevel":27,"version":24},"6fa7e35a-f896-4295-b0f9-2f56f171b193",{"type":54,"intro":694},[695,696],"Why are software updates so important?","Are auto-updates better than manual ones?",[698,711,727,741],{"id":699,"data":700,"type":24,"maxContentLevel":27,"version":24,"reviews":703},"cac5d788-7e75-4922-86fd-12944980be06",{"type":24,"contentRole":42,"markdownContent":701,"audioMediaId":702},"When you're building your fortress, strong passwords are important: those keys to the fortress gates. But passwords are only one of the ways to keep your system safe.\n\nImagine that all the gates in your fortress are securely locked. But one of the walls is crumbling: there's a crack between some of the stones. In the context of cybersecurity, we call this a **vulnerability**.\n\nA vulnerability is a weakness or error in a piece of software, which gives hackers a chance to squirm their way inside. These vulnerabilities can bypass all your password protections, just as a crack in the wall could bypass your fortress gate.","f95cc84d-b68b-439c-8fa3-7f2f715e261a",[704],{"id":705,"data":706,"type":73,"version":24,"maxContentLevel":27},"320e62a7-219e-44b6-a281-deac08de4b21",{"type":73,"reviewType":24,"spacingBehaviour":24,"activeRecallQuestion":707,"activeRecallAnswers":709},[708],"In the context of cybersecurity, what is a vulnerability?",[710],"A weakness or error in a piece of software",{"id":712,"data":713,"type":24,"maxContentLevel":27,"version":24,"reviews":716},"b39dbb49-0cd1-4e5e-880b-1a3ba4f456a9",{"type":24,"contentRole":42,"markdownContent":714,"audioMediaId":715},"Fortunately, there's a solution to vulnerabilities: **software updates**. These updates are designed to patch any dangerous vulnerabilities before hackers have a chance to exploit them.\n\nFor example, if you own a Windows laptop, Microsoft will constantly review their code. Whenever they spot a vulnerability, they'll push an update that lets you seal it up.\n\nSometimes, these updates feel like a hassle, but it's crucial to install them as soon as you have the chance. Delays leave your system vulnerable, just as delaying repairs could leave your fortress exposed to attacks.\n\n![Graph](image://edca593b-0926-40a3-a3c9-6823760fcd74 \"Updates in progress. Image: CSR2Forever, Public domain, via Wikimedia Commons\")","89970dc7-66bf-48bb-a503-b021641e4439",[717],{"id":718,"data":719,"type":73,"version":24,"maxContentLevel":27},"95077d12-5931-400c-ae53-381343542dfd",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":720,"multiChoiceCorrect":722,"multiChoiceIncorrect":724,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6},[721],"Which of these helps to fix vulnerabilities?",[723],"Software updates",[725,726,281],"Password managers","Cloud storage",{"id":728,"data":729,"type":24,"maxContentLevel":27,"version":42,"reviews":732},"9d73529e-1b57-4553-86c3-eb9b7296b8ac",{"type":24,"contentRole":42,"markdownContent":730,"audioMediaId":731},"A lot of software gives you the chance to turn on **auto-updates**. In theory, this fixes any vulnerabilities without you ever even needing to click anything.\n\nAs a general rule, you should try to turn on auto-updates whenever you get the chance. They're quick and convenient, and much more reliable than manual updates, which you might forget to install.\n\nYou shouldn't rely on them entirely, though. Sometimes, an auto-update will fail, and you'll have to take manual action.\n\nIf you do ever notice an update failure, you'll need to find a way to fix it. Often, a simple system restart can resolve the issue. If not, you should contact the tech support for the company (e.g. Microsoft) who rolled the update out.","85d6e249-2020-4b81-8e64-aa4a4fb083bf",[733],{"id":734,"data":735,"type":73,"version":24,"maxContentLevel":27},"e4968e09-ee04-4b06-a1b6-a78c171e4c33",{"type":73,"reviewType":24,"spacingBehaviour":24,"activeRecallQuestion":736,"activeRecallAnswers":738},[737],"What two steps should you take if you notice an update failure?",[739,740],"Restart the system, and try the update again","If that doesn't work, contact the company (e.g. Microsoft) who rolled the update out",{"id":742,"data":743,"type":24,"maxContentLevel":27,"version":42,"reviews":746},"91c470f8-cf10-48c7-a67d-5a1d7c0d9d37",{"type":24,"contentRole":42,"markdownContent":744,"audioMediaId":745},"Remember: not all updates are safe. Sometimes, Trojan viruses are disguised as updates, and attached to emails with urgent messages: 'Install this now, your entire system is at risk!'\n\nBecause of this, if you're ever doing some manual updates, you should only ever download these updates from trusted sources like the manufacturer's official website.\n\nThis is another argument in favor of auto-updates. They'll always come straight from the manufacturer, and lower the risk of you clicking a Trojan by mistake.\n\nEnable them on your computer. Enable them on your phone. Auto-updates are the very best way to seal those cracks in your walls.\n\n![Graph](image://784e4d5e-ecd8-4e99-8cc8-3f24a40b3497 \"pasted-image.png\")","1c9506e4-7e55-4dc5-bc43-d84088eed176",[747],{"id":748,"data":749,"type":73,"version":42,"maxContentLevel":27},"a0081191-5e95-43cf-bdbb-557d116e72f1",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":750,"multiChoiceCorrect":752,"multiChoiceIncorrect":754},[751],"As a general rule:",[753],"You should turn on auto-updates on all your devices",[755,756,757],"You should turn on auto-updates on your computer","You should only use manual updates","You should turn on auto-updates on your phone",{"id":759,"data":760,"type":42,"version":24,"maxContentLevel":27,"summaryPage":762,"introPage":770,"pages":776},"3ec1dae0-f070-43f3-8661-34fd2c9c83f1",{"type":42,"title":761},"Encryption",{"id":763,"data":764,"type":27,"maxContentLevel":27,"version":24},"dbf9f337-e60f-45f8-9f9a-8ba052723e93",{"type":27,"summary":765},[766,767,768,769],"Encryption turns readable plaintext into unreadable ciphertext","Asymmetric encryption is more secure than symmetric encryption","Many applications, like password managers, automatically encrypt your data","Always store your decryption keys in a separate location from your encrypted data",{"id":771,"data":772,"type":54,"maxContentLevel":27,"version":24},"43d2567a-682a-42aa-b0f7-e0481601c6e9",{"type":54,"intro":773},[774,775],"What is the purpose of encryption?","Which type of encryption is strongest?",[777,789,812,829],{"id":778,"data":779,"type":24,"maxContentLevel":27,"version":24,"reviews":782},"d11f89a0-027f-48b0-bd4a-7a2fb3853a13",{"type":24,"contentRole":42,"markdownContent":780,"audioMediaId":781},"So, passwords are the tightly-locked gates of your fortress. And updates are the patches that seal any cracks in the walls. But what if a hacker still gets in? You also need to take some steps to safeguard everything inside.\n\nThat's where **encryption** comes into play. It's a fundamental tool in cybersecurity, designed to protect all your files and data from unauthorized access. It does this by turning plaintext into ciphertext, making it impossible to read.\n\nHere's an example: the plaintext word \"hello!\" could be encrypted into a string of ciphertext like \"fRa4+6\". If a hacker managed to access this ciphertext, they'd have no idea what it meant.","b3757edc-a114-433c-9278-ac3032357266",[783],{"id":784,"data":785,"type":73,"version":24,"maxContentLevel":27},"f5bc6f4a-5a5f-4cb8-9de5-426c85c4f422",{"type":73,"reviewType":24,"spacingBehaviour":24,"activeRecallQuestion":786,"activeRecallAnswers":788},[787],"A piece of plain text (\"cat\") turns into ciphertext (\"4+f\"). What is this an example of?",[761],{"id":790,"data":791,"type":24,"maxContentLevel":27,"version":24,"reviews":794},"03327b8e-87b1-4270-9ea5-e12088854aff",{"type":24,"contentRole":42,"markdownContent":792,"audioMediaId":793},"Whenever you encrypt a piece of plaintext into ciphertext, you'll need to use an **encryption key**. This is a unique string of symbols, almost like a password, that scrambles your data in a unique way.\n\nIf you want to turn your ciphertext back into plaintext, you'll need to use a **decryption key**. This is another password that lets you change your files back into a normal, readable format.\n\n![Graph](image://9613ab5e-569f-4cc2-8a54-b675be84c4b6 \"Encryption. MarcT0K (icons by JGraph), CC BY 4.0 \u003Chttps://creativecommons.org/licenses/by/4.0>, via Wikimedia Commons\")\n\nThere are a couple of different approaches to this. With symmetric encryption, the encryption key and the decryption key are the same. With asymmetric encryption, the two keys are different. This approach is more complex, and therefore a lot more secure.","383660b6-0459-4e24-93bc-290789228a65",[795],{"id":796,"data":797,"type":73,"version":24,"maxContentLevel":27},"69b38e43-82b6-40b7-9eab-246d2f43049f",{"type":73,"reviewType":250,"spacingBehaviour":24,"matchPairsQuestion":798,"matchPairsPairs":799,"matchPairsShowExamples":6},[252],[800,803,806,809],{"left":801,"right":802,"direction":27},"Encryption key","Turns plaintext into ciphertext",{"left":804,"right":805,"direction":27},"Decryption key","Turns ciphertext into plaintext",{"left":807,"right":808,"direction":27},"Symmetric encryption","Method of encryption where the same key is used",{"left":810,"right":811,"direction":27},"Asymmetric encryption","Method of encryption where different keys are used",{"id":813,"data":814,"type":24,"maxContentLevel":27,"version":24,"reviews":817},"0794a821-330f-4590-b695-9332b6fffecd",{"type":24,"contentRole":42,"markdownContent":815,"audioMediaId":816},"Encryption is integrated into a lot of applications automatically. For instance, most password managers automatically encrypt your passwords.\n\nThis provides an additional layer of cybersecurity, ensuring that even if your passwords are accessed, they'll remain unreadable (unless a hacker also has the decryption key).\n\nAs well as this, it's worth taking steps to manually encrypt your most important files. A lot of people will go ahead and encrypt their entire hard drive.\n\nThis process will be slightly different depending on your operating system, but there are plenty of popular encryption tools out there, like VeraCrypt and Bitlocker. Just get online, and find one that works for you.","f1bccc1f-4853-4344-a7fd-447220eba81d",[818],{"id":819,"data":820,"type":73,"version":24,"maxContentLevel":27},"3afa78e8-be91-4ab0-9c1f-751a1453932d",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":821,"multiChoiceCorrect":823,"multiChoiceIncorrect":825,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6},[822],"VeraCrypt and Bitlocker are popular examples of what?",[824],"Tools for encrypting files",[826,827,828],"Tools for backing up files","Password management programmes","Antivirus programmes",{"id":830,"data":831,"type":24,"maxContentLevel":27,"version":24,"reviews":834},"7c8ad9c6-3ca1-499b-a03f-90ecba4f55f7",{"type":24,"contentRole":42,"markdownContent":832,"audioMediaId":833},"Whenever you encrypt your important files, you'll also need to find a place to securely store the decryption key. If you lose that key, you won't be able to turn your files back into a readable format.\n\nIt's important to store decryption keys in a separate location from the encrypted data. Otherwise, if a hacker reached this location, they'd have everything they needed to decrypt the data back into something useful.\n\nA cloud key management service (KMS) is a good option for this. It's like a password manager for decryption keys, all stored in a cloud far away from your actual files.\n\nOverall, encryption is another vital tool in the battle against cyber attackers. Passwords and updates try to keep hackers out, while encryption keeps your files safe if anyone manages to get in.\n\n![Graph](image://5153a75e-5f16-4f9d-a223-58226a71b693 \"Data doesn't actually look like this. Image: via Pexels\")","12a80d59-4038-4f45-a8df-dbc349fb85d9",[835,844],{"id":836,"data":837,"type":73,"version":24,"maxContentLevel":27},"10c6e129-89f7-4ac3-a404-d2d3831dca0f",{"type":73,"reviewType":42,"spacingBehaviour":24,"binaryQuestion":838,"binaryCorrect":840,"binaryIncorrect":842},[839],"Should you store decryption keys in the same place as your encrypted data?",[841],"No - If a hacker reaches this location, they can use the key to decrypt the data",[843],"Yes - If the key isn't kept in the same place, you're much more likely to lose it",{"id":845,"data":846,"type":73,"version":24,"maxContentLevel":27},"cdc35cdc-0ba2-472c-a0fc-100325d91d34",{"type":73,"reviewType":24,"spacingBehaviour":24,"activeRecallQuestion":847,"activeRecallAnswers":849},[848],"Which service is like a password manager for decryption keys?",[850],"Cloud key management service (KMS)",{"id":852,"data":853,"type":42,"version":42,"maxContentLevel":27,"summaryPage":855,"introPage":862,"pages":868},"d86fa73d-735c-4283-ad8c-ae194415bb57",{"type":42,"title":854},"Backups",{"id":856,"data":857,"type":27,"maxContentLevel":27,"version":24},"f1e1f581-bd9f-40f6-bdd7-14a5a97bcf08",{"type":27,"summary":858},[859,860,861],"Backups are duplicates of data, which provide a safety net after an attack","External hard drives can be used to store tangible, physical backups of your data","Cloud storage can be used to store convenient, automatic backups of your data",{"id":863,"data":864,"type":54,"maxContentLevel":27,"version":24},"30adefac-6cb2-43dc-89cb-db5224537e70",{"type":54,"intro":865},[866,867],"What are the two main ways to backup your data?","What precautions should you take when setting up backups?",[869,884,922],{"id":870,"data":871,"type":24,"maxContentLevel":27,"version":24,"reviews":874},"1e1c64d0-cd6a-4803-ab99-8af8d2c45597",{"type":24,"contentRole":42,"markdownContent":872,"audioMediaId":873},"Imagine that a hacker finds a way to enter your fortress. They bypass your defenses, and even manage to decrypt your important files. It's unlikely, but it isn't impossible. None of these cybersecurity methods are 100% unbreakable.\n\nThe hacker might destroy your data. Or they'll take it hostage, and demand a ransom. You don't know what to do. You don't want to lose your important personal files.\n\nThat's where **backups** come in. You can think of these as a safety net – a final defense after everything else has failed.","a2bf0342-2a0b-4234-8fc6-2064dcbcb0ad",[875],{"id":876,"data":877,"type":73,"version":24,"maxContentLevel":27},"60568bc7-2cad-4e27-8785-27f111c558b2",{"type":73,"reviewType":42,"spacingBehaviour":24,"binaryQuestion":878,"binaryCorrect":880,"binaryIncorrect":882},[879],"In the context of cybersecurity, which of these best describes backups?",[881],"They're a safety net when all else fails",[883],"They're a defensive wall that keep hackers out",{"id":885,"data":886,"type":24,"maxContentLevel":27,"version":24,"reviews":889},"07a11b4d-7df6-4b4f-8ce7-f962c2428514",{"type":24,"contentRole":42,"markdownContent":887,"audioMediaId":888},"Backups are essentially duplicates of all your important files and data. You can use them to restore any damaged data, mitigating most of the harm that was caused by an attack.\n\nThey're easy to set up. You just need to copy all your important files, then paste them into a second location.\n\nFor example, you could use an **external hard drive**. These devices offer a tangible medium for storing copies of your data. A solid little box tucked up in a drawer, completely separate from your main computer, where no hacker could possibly reach it.\n\n![Graph](image://73df71fa-d905-416f-b3b7-8e7e896589f5 \"External hard drive. Image: via Pexels\")\n\nHaving said that, it's worth encrypting any files that you backup on an external hard drive. Yes, ideally no one will find it, but you can never be too careful.","cbbc785b-168c-4404-9d76-5e33422b5761",[890,908],{"id":891,"data":892,"type":73,"version":24,"maxContentLevel":27},"e5e323fe-1b17-4e32-8639-47119194dcb0",{"type":73,"reviewType":27,"spacingBehaviour":24,"collapsingSiblings":893,"multiChoiceQuestion":897,"multiChoiceCorrect":899,"multiChoiceIncorrect":901,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6,"matchPairsQuestion":904,"matchPairsPairs":905},[894,895,896],"6150199f-660c-4dc1-943a-3a5f71616448","08121700-0f1e-4a1e-a2e4-104187164c2c","8b38fc36-a58c-47b2-8a82-7a0de1786508",[898],"Which of these should be used as physical storage for backups?",[900],"External hard drive",[902,660,903],"Cloud provider","Firewall",[252],[906],{"left":900,"right":907,"direction":27},"Physical storage for backups",{"id":909,"data":910,"type":73,"version":24,"maxContentLevel":27},"1ebd9cc6-01c7-43b7-8c89-639fa04f7f67",{"type":73,"reviewType":15,"spacingBehaviour":24,"orderAxisType":250,"orderQuestion":911,"orderItems":913},[912],"Put these steps in order for using an external hard drive.",[914,916,918,920],{"label":915,"sortOrder":4},"Identify important files",{"label":917,"sortOrder":24},"Copy important files",{"label":919,"sortOrder":42},"Paste onto external hard drive",{"label":921,"sortOrder":27},"Encrypt external hard drive",{"id":923,"data":924,"type":24,"maxContentLevel":27,"version":42,"reviews":927},"2d59bab5-63f0-4750-8786-087592d572b5",{"type":24,"contentRole":42,"markdownContent":925,"audioMediaId":926},"**Cloud providers** are another way to backup all your files. Popular options are Google Drive and Dropbox, which allow you to store a copy of your data in a safe, remote server.\n\nThey even offer automatic backup options, instantly replicating any changes you make to files on your main computer. This is much more convenient than an external hard drive, which you'll need to plug in and manually manage if you want to keep your backups up to date.\n\nBut remember: only use a cloud provider with a robust security system. You need to treat your backups like a secondary fortress, and make sure they're properly secured.\n\n![Graph](image://947262cf-7529-4bf2-a73c-d7fa35395f4e \"A different type of cloud. Image: via Pexels\")","bacabb6a-60f6-4ef3-b33c-11b60dff6e5c",[928,939],{"id":894,"data":929,"type":73,"version":42,"maxContentLevel":27},{"type":73,"reviewType":27,"spacingBehaviour":24,"collapsingSiblings":930,"multiChoiceQuestion":931,"multiChoiceCorrect":933,"multiChoiceIncorrect":934,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6,"matchPairsQuestion":935,"matchPairsPairs":936},[891,895,896],[932],"Which of these can be used as remote storage for backups?",[902],[900,660,903],[252],[937],{"left":902,"right":938,"direction":27},"Remote storage for backups",{"id":940,"data":941,"type":73,"version":24,"maxContentLevel":27},"003d2bcd-3840-4a81-9425-e1594c952088",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":942,"multiChoiceCorrect":944,"multiChoiceIncorrect":946,"multiChoiceMultiSelect":21,"multiChoiceRevealAnswerOption":6},[943],"What is an advantage of using cloud providers for your backups?",[945],"They offer automatic backup options",[947,948,949],"They're free to use","They can't be hacked","They increase your computer's speed",{"id":951,"data":952,"type":42,"version":37,"maxContentLevel":27,"summaryPage":954,"introPage":962,"pages":968},"01acdf83-61a9-4254-a69a-245f6ebb1587",{"type":42,"title":953},"Other software",{"id":955,"data":956,"type":27,"maxContentLevel":27,"version":24},"91298337-77da-4b06-9cca-9b7620ce5984",{"type":27,"summary":957},[958,959,960,961],"Antivirus software is designed to block malware, and scan your systems for possible threats","There are various antivirus options, both paid and free, each with their own pros and cons","Firewalls monitor network traffic, blocking anything that breaks pre-defined rules","Even if you've set these programmes up, you should always stay vigilant, as no system is fully protected",{"id":963,"data":964,"type":54,"maxContentLevel":27,"version":24},"2c0699c5-eea6-4dbe-b7d0-7a97a7c2946e",{"type":54,"intro":965},[966,967],"What is the role of antivirus software and firewalls?","Once you've set up these programmes, do you need any other defenses?",[969,986,992,1009],{"id":970,"data":971,"type":24,"maxContentLevel":27,"version":42,"reviews":974},"7cf21b60-5b56-49d4-851e-20d02a3dc927",{"type":24,"contentRole":42,"markdownContent":972,"audioMediaId":973},"Your fortress is looking pretty strong now: good passwords, auto-updates, encryption, and plenty of backups. But there's one more thing your fortress needs: a team of professional guards.\n\nThis is where **antivirus software** comes into play. These specialist programmes sit on your system, blocking any dangerous malware that tries to make its way in. It will also actively scan your system, constantly checking for threats and vulnerabilities.\n\nIf the programme detects anything, it will promptly alert you with a warning message. This helps you to take immediate action, and keep your system safe.","79fe7488-b6a0-4208-8ec2-e95f28264108",[975],{"id":895,"data":976,"type":73,"version":24,"maxContentLevel":27},{"type":73,"reviewType":27,"spacingBehaviour":24,"collapsingSiblings":977,"multiChoiceQuestion":978,"multiChoiceCorrect":980,"multiChoiceIncorrect":981,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6,"matchPairsQuestion":982,"matchPairsPairs":983},[891,894,896],[979],"Which of these can be used to scan your system for malware?",[660],[900,902,903],[252],[984],{"left":660,"right":985,"direction":27},"Scans system for malware",{"id":987,"data":988,"type":24,"maxContentLevel":27,"version":991},"d627a01c-63b1-4573-9f2f-370827589f10",{"type":24,"contentRole":42,"markdownContent":989,"audioMediaId":990},"There are plenty of antivirus options available on the market. Norton Antivirus is a popular choice, but it's relatively expensive, and some users complain that it isn't as efficient as it could be.\n\n![Graph](image://ed5d127b-4931-44ee-9d1d-e628fe78647d \"Norton logo. Image: NortonLifeLock Inc., Public domain, via Wikimedia Commons\")\n\nMcAfee and Kaspersky are two more options. Along with Norton, they're probably the best known brands in the field of antivirus software, but they're also relatively costly (as of 2024, Kaspersky is also banned in some countries, due to the fact they're based in Russia).\n\nThere are also a few free options out there, like Bitdefender. Just like the others, it will keep a lot of malware out, but it doesn't have as many features as the paid alternatives.\n\n![Graph](image://7948bea9-71af-419d-811c-1fa510d6a727 \"Bitdefender logo. Image: Wikirem92, CC BY-SA 4.0 \u003Chttps://creativecommons.org/licenses/by-sa/4.0>, via Wikimedia Commons\")\n\nAt the end of the day, all of these options have different pros and cons. It's worth checking out some online reviews, and choosing what's right for you.","8b7e2554-f0fe-475b-a4aa-65b4c6d56e4b",5,{"id":993,"data":994,"type":24,"maxContentLevel":27,"version":24,"reviews":997},"f3f7bbc5-4100-42f2-84c5-4326756d199b",{"type":24,"contentRole":42,"markdownContent":995,"audioMediaId":996},"In addition to antivirus software, it's also important to equip your system with a **firewall**.\n\nA firewall is yet another line of defense. It keeps an eye on any network traffic coming in and out of your computer, and compares that traffic to a set of predefined rules. If something appears to break these rules, the firewall won't let it through.\n\nFirewalls are often pre-installed on computer systems, providing an immediate level of protection. However, it's important to check that this firewall is turned on and properly updated. Otherwise, it can't be expected to provide an effective defense.\n\n![Graph](image://8f55d9ae-aa2e-4928-bfdf-ac1b8a63c170 \"Fire. Image: via Pexels\")","e965b3cb-977c-455b-9b02-140185b6a422",[998],{"id":896,"data":999,"type":73,"version":24,"maxContentLevel":27},{"type":73,"reviewType":27,"spacingBehaviour":24,"collapsingSiblings":1000,"multiChoiceQuestion":1001,"multiChoiceCorrect":1003,"multiChoiceIncorrect":1004,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6,"matchPairsQuestion":1005,"matchPairsPairs":1006},[891,894,895],[1002],"Which of these can be used to block rule-breaking traffic?",[903],[900,902,660],[252],[1007],{"left":903,"right":1008,"direction":27},"Blocks rule-breaking traffic",{"id":1010,"data":1011,"type":24,"maxContentLevel":27,"version":42,"reviews":1014},"b29cf5fb-8ea2-4f44-87ba-b4e3b8935149",{"type":24,"contentRole":42,"markdownContent":1012,"audioMediaId":1013},"There's a potential danger attached to firewalls and antivirus software: **overconfidence**. People think to themselves, \"with these specialist programmes, my systems must be fully protected!\"\n\nBut these pieces of software aren't infallible. Occasional malware could still make its way through, and that's why you also need those other defenses: strong passwords, auto-updates, encryption, backups, and so on.\n\nEven then, you should always be vigilant. Cybersecurity isn't just about having the right tools. It's also about being the right user: proactive, informed, and prepared for the unexpected.","425ed970-fafa-43de-a395-508778ed0ff8",[1015,1025,1032],{"id":1016,"data":1017,"type":73,"version":42,"maxContentLevel":27},"91246c57-b588-4fa4-842a-3290f335ced9",{"type":73,"reviewType":42,"spacingBehaviour":24,"binaryQuestion":1018,"binaryCorrect":1020,"binaryIncorrect":1022,"multiChoiceIncorrect":1024},[1019],"Firewalls are often pre-installed on computer systems. However:",[1021],"You need to make sure that your firewall is turned on",[1023],"You need to make sure that your firewall is turned off",[1023],{"id":1026,"data":1027,"type":73,"version":24,"maxContentLevel":27},"7f4594fd-df04-4fd0-900f-a78e9d11b6c7",{"type":73,"reviewType":24,"spacingBehaviour":24,"activeRecallQuestion":1028,"activeRecallAnswers":1030},[1029],"What happens when antivirus software detects a threat?",[1031],"It alerts you with a warning message",{"id":1033,"data":1034,"type":73,"version":24,"maxContentLevel":27},"44d34449-81f1-4128-8490-8bac4dad1426",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":1035,"multiChoiceCorrect":1037,"multiChoiceIncorrect":1039,"multiChoiceMultiSelect":21,"multiChoiceRevealAnswerOption":6},[1036],"In addition to antivirus software, what else does your system need?",[658,1038,761,854],"Auto-updates",[1040],"Cryptojacks",{"id":1042,"data":1043,"type":29,"maxContentLevel":27,"version":37,"orbs":1046},"a7ee7d12-16eb-48a2-8f79-c7767bf68c8e",{"type":29,"title":1044,"tagline":1045},"Other Safety Measures","Learn some extra techniques for staying safe",[1047,1176,1268,1362,1443,1520,1605],{"id":1048,"data":1049,"type":42,"version":27,"maxContentLevel":27,"summaryPage":1051,"introPage":1059,"pages":1065},"7bc7cdfa-180c-47bb-afba-6f5d7a5ed1be",{"type":42,"title":1050},"Safe browsing",{"id":1052,"data":1053,"type":27,"maxContentLevel":27,"version":24},"50b18b58-31ae-4df5-b951-bc698a3b7a70",{"type":27,"summary":1054},[1055,1056,1057,1058],"Private browsing modes prevent storage of browsing history and cookies","Pop-up ads can be blocked in browser settings, or using adblocker extensions","Using a secondary non-admin user account is safer than using an admin account","Websites with 'https' in the URL encrypt their data, which makes them safer to visit",{"id":1060,"data":1061,"type":54,"maxContentLevel":27,"version":24},"3193e6bc-0d47-4c1c-819e-89daf0a88dbc",{"type":54,"intro":1062},[1063,1064],"How can you tweak your browser settings to enhance your online security?","What's the significance of 'https' in a website's URL?",[1066,1090,1118,1123,1136,1151],{"id":1067,"data":1068,"type":24,"maxContentLevel":27,"version":24,"reviews":1071},"47240d44-ef7f-4dca-a665-2a44739141b5",{"type":24,"contentRole":42,"markdownContent":1069,"audioMediaId":1070},"Navigating the internet safely is like tiptoeing through a minefield. Every action you take, every link you click, every website you visit – it carries a potential risk.\n\n![Graph](image://198ba92b-9c65-4f7c-9e16-344ef9817bea \"Web browsing. Image: Google, Public domain, via Wikimedia Commons\")\n\nTake **cookies**, for example. These tiny files are stored on your browser, and keep track of the websites you visit. They can improve your overall browsing experience: for example, a cookie might auto-fill your home address when you're filling out an online form.\n\nBut what if a hacker gains access to these cookies? Suddenly, they could find out your home address, your credit card number, and whatever else your browser has stored up.","eaec1704-7148-4614-b6d3-4e884ac6007d",[1072],{"id":1073,"data":1074,"type":73,"version":24,"maxContentLevel":27},"146f5dd4-1a2d-4aba-a10d-26531984ccc6",{"type":73,"reviewType":27,"spacingBehaviour":24,"collapsingSiblings":1075,"multiChoiceQuestion":1079,"multiChoiceCorrect":1081,"multiChoiceIncorrect":1083,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6,"matchPairsQuestion":1086,"matchPairsPairs":1087},[1076,1077,1078],"08172d9f-174a-4283-98ce-2157a4c4d822","23531227-ba75-448b-a7c9-1cb4678f8deb","cd36de7e-c599-448c-bd36-56655f2378b6",[1080],"Which of these is a type of file stored on your browser?",[1082],"Cookie",[1084,1085,451],"Private browsing","Evil twin",[252],[1088],{"left":1082,"right":1089,"direction":27},"File stored on a browser",{"id":1091,"data":1092,"type":24,"maxContentLevel":27,"version":42,"reviews":1095},"f39bff8b-92dc-4e59-bd3d-d8018049fc3b",{"type":24,"contentRole":42,"markdownContent":1093,"audioMediaId":1094},"Many of the browsers we use to access the internet, like Google Chrome, come with default settings that put convenience ahead of security. You'll have to take the initiative, and tweak those settings, if you want to keep yourself safe.\n\nIn terms of cookies, most browsers come with **private browsing** or incognito modes. If you use these modes, it stops the browser from storing your browsing history, cookies, and other temporary files.\n\nIn most cases, you'll have to remember to switch on this private mode every time you open the browser. But some browsers, like Firefox, have an 'always use private browsing' option, which keeps you in private mode automatically.\n\n![Graph](image://08433cfa-285b-45f5-a614-bbcb83ede7e5 \"Firefox browser. Image: Mozilla Foundation (MPL 1.1 \u003Chttps://www.mozilla.org/MPL/1.1/>, GPL \u003Chttp://www.gnu.org/licenses/gpl.html> or LGPL \u003Chttp://www.gnu.org/licenses/lgpl.html>), via Wikimedia Commons\")","fd4b61e5-e590-428b-9eb1-660b23e93989",[1096,1107],{"id":1076,"data":1097,"type":73,"version":24,"maxContentLevel":27},{"type":73,"reviewType":27,"spacingBehaviour":24,"collapsingSiblings":1098,"multiChoiceQuestion":1099,"multiChoiceCorrect":1101,"multiChoiceIncorrect":1102,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6,"matchPairsQuestion":1103,"matchPairsPairs":1104},[1073,1077,1078],[1100],"Which of these prevents data from being stored while you're browsing?",[1084],[1082,1085,451],[252],[1105],{"left":1084,"right":1106,"direction":27},"Prevents data from being stored",{"id":1108,"data":1109,"type":73,"version":24,"maxContentLevel":27},"30571186-ba8c-488f-ab8d-ace969de8b4d",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":1110,"multiChoiceCorrect":1112,"multiChoiceIncorrect":1114,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6},[1111],"Which browser comes with an 'always use private browsing' option?",[1113],"Firefox",[1115,1116,1117],"Google Chrome","Internet Explorer","Safari",{"id":1119,"data":1120,"type":24,"maxContentLevel":27,"version":24},"25054420-db6c-475a-bbae-a2ecc6310bf9",{"type":24,"contentRole":42,"markdownContent":1121,"audioMediaId":1122},"Another danger with online browsing comes in the form of **pop-up ads**. They're not just annoying; they can also be a way for hackers to get malware onto your device.\n\nSometimes, these pop-ups aren't even visible. They hover on web pages, completely unseen, waiting for you to click one by mistake. The moment you do, they'll take it as an invitation to redirect you to a dangerous website, or start downloading a piece of malware.\n\nIf you delve into your browser settings, you can usually find an option to block these pop-ups. This setting might not be 100% effective, but it's definitely worth turning on.","bcf3938a-0851-4342-8e19-1be3dc6f627d",{"id":1124,"data":1125,"type":24,"maxContentLevel":27,"version":42,"reviews":1128},"a80e92a0-181b-47c4-b653-37c65e052816",{"type":24,"contentRole":42,"markdownContent":1126,"audioMediaId":1127},"If you're looking for a more robust solution to pop-ups and ads, you can download a specialist **adblocker**, like the popular uBlock Origin.\n\n![Graph](image://aa139d39-8679-4088-b03c-5bd7025fc2f0 \"uBlock Origin. Image: Raymond Hill (gorhill) - developer, GPLv3 \u003Chttp://www.gnu.org/licenses/gpl-3.0.html>, via Wikimedia Commons\")\n\nAn adblocker will usually take the form of a browser extension, which sits in the corner, ready to be turned on when you need it. When it's active, the adblocker will hide adverts, block pop-ups, and generally keep your browsing experience cleaner and more secure.\n\nBut it's worth remembering: your favorite websites won't get any ad revenue if you use an adblocker when you visit. If you like (and trust) a website, turn your adblocker off when you visit.","deccb91b-976f-48cd-a7c2-03404926c283",[1129],{"id":1130,"data":1131,"type":73,"version":24,"maxContentLevel":27},"50eab1ba-5629-4a05-a09e-035ce6365266",{"type":73,"reviewType":24,"spacingBehaviour":24,"activeRecallQuestion":1132,"activeRecallAnswers":1134},[1133],"What type of software can be used to hide adverts and block pop-ups?",[1135],"Adblocker",{"id":1137,"data":1138,"type":24,"maxContentLevel":27,"version":24,"reviews":1141},"76ac76d3-afb2-4dd9-b62e-44662648d8f3",{"type":24,"contentRole":42,"markdownContent":1139,"audioMediaId":1140},"Here’s another layer of defense that you can use when you’re browsing the web: set up two user accounts on your personal computer, one with admin privileges, and one without.\n\nIf you use your **non-admin** account for web browsing, it makes things a lot harder for malware. Why? Because nothing is allowed to download or install itself via a non-admin account.\n\nIf it tries, then a window will appear on the screen, asking you to give explicit permission by entering the admin account’s password. If you don’t enter this password – and you definitely shouldn’t, if you don’t recognize the download – then the malware will struggle to take hold.","29a3531f-cbc3-4960-8b8c-15d6f42a02f2",[1142],{"id":1143,"data":1144,"type":73,"version":24,"maxContentLevel":27},"be96f3ef-5e6a-4aa1-9a09-ed69f932794b",{"type":73,"reviewType":42,"spacingBehaviour":24,"binaryQuestion":1145,"binaryCorrect":1147,"binaryIncorrect":1149},[1146],"You set up two profiles on your laptop: admin and non-admin. Which one should you use for web browsing?",[1148],"Non-admin - with fewer permissions, it's harder to install malware",[1150],"Admin - with more permissions, it's easier to block malware",{"id":1152,"data":1153,"type":24,"maxContentLevel":27,"version":24,"reviews":1156},"5c034e36-9d65-454d-8b47-8314c4724490",{"type":24,"contentRole":42,"markdownContent":1154,"audioMediaId":1155},"Another thing to keep an eye on is the security protocols used by websites. Basically, before ever visiting a website, you should check the URL.\n\nIf the URL starts with 'https' (e.g. https://kinnu.xyz/), that means the site is secure. Any data you send to this site will be encrypted, which makes it harder for hackers to steal. Like anything, this isn't a perfect defense, but these websites are definitely safer than non-secured alternatives.\n\nMost browsers display a lock icon in the search bar when you visit a secure 'https' site. They'll also give you a warning if a site isn't secure. If you receive that warning, or don't see a lock, think twice before visiting the website.\n\n![Graph](image://e3bd6345-1e57-450e-97c7-fa5409cda6d2 \"HTTPS. Image: Sean MacEntee, CC BY 2.0 \u003Chttps://creativecommons.org/licenses/by/2.0>, via Wikimedia Commons\")","bcd86e1e-4fde-4949-9d48-2210945309e1",[1157],{"id":1158,"data":1159,"type":73,"version":24,"maxContentLevel":27},"00274213-b6e9-4c38-82f3-b1367be21a18",{"type":73,"reviewType":27,"spacingBehaviour":24,"collapsingSiblings":1160,"multiChoiceQuestion":1164,"multiChoiceCorrect":1166,"multiChoiceIncorrect":1168,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6,"matchPairsQuestion":1172,"matchPairsPairs":1173},[1161,1162,1163],"99774e90-7ef1-4452-8280-e4f43a7087da","cb174a1a-a5f5-4ce5-869a-3ce422d977c1","1309f82e-2952-4cce-a258-0e6eb557547e",[1165],"Which of these is a sign of a secure website?",[1167],"HTTPS",[1169,1170,1171],"SSID","VPN","WormGPT",[252],[1174],{"left":1167,"right":1175,"direction":27},"Sign of a secure website",{"id":1177,"data":1178,"type":42,"version":24,"maxContentLevel":27,"summaryPage":1180,"introPage":1188,"pages":1194},"db8380a3-439f-4b14-b1dd-7c03c846d13f",{"type":42,"title":1179},"Safe WiFi",{"id":1181,"data":1182,"type":27,"maxContentLevel":27,"version":24},"69414d34-aac8-475a-ac9f-8f6a0373834a",{"type":27,"summary":1183},[1184,1185,1186,1187],"Evil twins are fake Wi-Fi networks that hackers want you to connect to","Always turn off auto-connect, file sharing, and Bluetooth when they're not in use","Regularly change your home Wi-Fi network's SSID and password to something strong and unique ","Use a VPN to encrypt your connection and hide your location while you're browsing",{"id":1189,"data":1190,"type":54,"maxContentLevel":27,"version":24},"33fb0d4b-1a57-4200-afa4-51dc83e4b174",{"type":54,"intro":1191},[1192,1193],"What steps can you take to secure your home Wi-Fi network?","How does a VPN enhance your online safety?",[1195,1212,1217,1234,1251],{"id":1196,"data":1197,"type":24,"maxContentLevel":27,"version":24,"reviews":1200},"342f7c68-dad5-4201-9318-1ff23bba6b13",{"type":24,"contentRole":42,"markdownContent":1198,"audioMediaId":1199},"Wi-Fi seems to be everywhere these days, making it super easy for us to stay connected, even when we're out and about. But from the perspective of cybersecurity, Wi-Fi can be dangerous.\n\nYou know when you're in a coffee shop, and you see a bunch of networks pop up on your device? Some of those might not be as legit as they seem. Cybercriminals often set up networks with names that appear to be real. For example, they might set up an open network called 'Coffee Shop - Guest' or even something like 'Starbucks WiFi'.\n\nOnce you connect to that network, the cybercriminal can intercept your data, or access your device. This type of attack is known as an **evil twin**.\n\nBasically, you should never connect to a public Wi-Fi without checking if that network is real. If you're in a coffee shop, or an airport, or anywhere else, double check with someone who works there.\n\n![Graph](image://9e575ae1-4f73-4cdf-9fec-6ddd646f0bb2 \"Wi-Fi or evil twin? Image: via Pexels\")","5ecd0bc2-b051-4ff7-8e5e-c4e4561d9157",[1201],{"id":1077,"data":1202,"type":73,"version":24,"maxContentLevel":27},{"type":73,"reviewType":27,"spacingBehaviour":24,"collapsingSiblings":1203,"multiChoiceQuestion":1204,"multiChoiceCorrect":1206,"multiChoiceIncorrect":1207,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6,"matchPairsQuestion":1208,"matchPairsPairs":1209},[1073,1076,1078],[1205],"Which of these is a term for a fake Wi-Fi network?",[1085],[1082,1084,451],[252],[1210],{"left":1085,"right":1211,"direction":27},"Fake Wi-Fi network",{"id":1213,"data":1214,"type":24,"maxContentLevel":27,"version":24},"24dbc7e0-2935-45db-ae02-6a3e504ff590",{"type":24,"contentRole":42,"markdownContent":1215,"audioMediaId":1216},"Another potential Wi-Fi pitfall is the **auto-connect** setting, which you can find on most of your devices.\n\nAt first glance, this setting feels nice and convenient. If you're in an area with public Wi-Fi, your phone or laptop will automatically connect, saving you a couple of clicks. But this auto-connect function could pull you into an unsafe network. Always make sure to go into your device settings, and switch your auto-connect off.\n\nThe same goes for **file sharing** and **Bluetooth**. These services put out signals that make your devices more discoverable, almost like waving a flag. If you're not currently using them, you should switch them off, to reduce the risk of a cybercriminal remotely accessing your device.","f470cbd5-b969-4002-b815-fdd43d528b6f",{"id":1218,"data":1219,"type":24,"maxContentLevel":27,"version":24,"reviews":1222},"d5e1c2e4-45fb-474e-88a8-5c3de9502e57",{"type":24,"contentRole":42,"markdownContent":1220,"audioMediaId":1221},"Your home Wi-Fi network can also be a potential target for cyberattacks. If a hacker manages to connect to it, they'll be able to access all your home devices that are connected to that Wi-Fi too.\n\nLuckily, there are some easy steps that can help to stop this from happening.\n\nYou know the name of your Wi-Fi network that others can see? That's called the **Service Set Identifier** (SSID). Usually, it's something simple, like the brand of your network. But simple SSIDs are easier to find. Take the time to change it to something less obvious, and it will boost your network security.","25ff2c7c-40f9-43b7-ab86-bab00c7a03f5",[1223],{"id":1161,"data":1224,"type":73,"version":24,"maxContentLevel":27},{"type":73,"reviewType":27,"spacingBehaviour":24,"collapsingSiblings":1225,"multiChoiceQuestion":1226,"multiChoiceCorrect":1228,"multiChoiceIncorrect":1229,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6,"matchPairsQuestion":1230,"matchPairsPairs":1231},[1158,1162,1163],[1227],"Which of these is the public name of a Wi-Fi network?",[1169],[1167,1170,1171],[252],[1232],{"left":1169,"right":1233,"direction":27},"Name of a Wi-Fi network",{"id":1235,"data":1236,"type":24,"maxContentLevel":27,"version":24,"reviews":1239},"aa3f1cce-a4bd-472b-9f8b-7449168f0640",{"type":24,"contentRole":42,"markdownContent":1237,"audioMediaId":1238},"As well as changing your network's SSID, you should also change the **network password**. Make sure that it's something long, and strong, and difficult to crack.\n\nOn top of this, check your Wi-Fi's settings, and make sure to enable **network encryption**, while turning off **network name broadcasting**. If you're having any trouble finding these settings, get in touch with your provider, and ask them for a bit of help.\n\nAnd one more thing: don't just set it and forget it. Every so often, take a look at your network, and check if there are any devices that you don't recognize. Regularly change your SSID and password, and always make sure to keep your router updated.\n\n![Graph](image://a181dfc5-ad88-4675-84b3-ec029459f0ba \"This password could be stronger. Image: Dustin Batt, CC BY-SA 2.0 \u003Chttps://creativecommons.org/licenses/by-sa/2.0>, via Wikimedia Commons\")","eb4c9a1e-4b14-45ac-88a9-f01e61863259",[1240],{"id":1241,"data":1242,"type":73,"version":24,"maxContentLevel":27},"a7cb0bab-2fb9-42c7-aa53-726f40ce3c14",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":1243,"multiChoiceCorrect":1245,"multiChoiceIncorrect":1249,"multiChoiceMultiSelect":21,"multiChoiceRevealAnswerOption":6},[1244],"What are some steps you can take to secure your home Wi-Fi network?",[1246,1247,1248],"Change the SSID","Change the password","Enable network encryption",[1250],"Turn on network name broadcasting",{"id":1252,"data":1253,"type":24,"maxContentLevel":27,"version":24,"reviews":1256},"06b91fbe-f57d-4ae5-a1b1-d268ed3a8edd",{"type":24,"contentRole":42,"markdownContent":1254,"audioMediaId":1255},"Another important safety measure, in the context of Wi-Fi, is a Virtual Private Network – better known as a **VPN**.\n\nThis piece of software encrypts your internet connection, hides your physical location, and stops other people from tracking what you do online.\n\nPopular VPNs include NordVPN, ExpressVPN, and Surfshark. These services aren't free, but they're well worth the price if you're serious about protecting your devices.\n\n![Graph](image://3c94cc3c-27f2-4cc1-9df3-4fa93adb9d06 \"VPN in action. Image: via Pexels\")\n\nA VPN makes your devices invisible whenever you connect to Wi-Fi. Or, rather, it makes them a lot less visible than they would be if you didn't have one.","78a4485d-60bb-4581-a709-8f6c0d7b2532",[1257],{"id":1162,"data":1258,"type":73,"version":24,"maxContentLevel":27},{"type":73,"reviewType":27,"spacingBehaviour":24,"collapsingSiblings":1259,"multiChoiceQuestion":1260,"multiChoiceCorrect":1262,"multiChoiceIncorrect":1263,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6,"matchPairsQuestion":1264,"matchPairsPairs":1265},[1158,1161,1163],[1261],"Which of these is a tool for encrypting your internet connection?",[1170],[1167,1169,1171],[252],[1266],{"left":1170,"right":1267,"direction":27},"Tool for encrypting connection",{"id":1269,"data":1270,"type":42,"version":24,"maxContentLevel":27,"summaryPage":1272,"introPage":1280,"pages":1286},"40384663-3bc2-4779-a17c-4b18668515fd",{"type":42,"title":1271},"Phishing scams",{"id":1273,"data":1274,"type":27,"maxContentLevel":27,"version":24},"5c72fe13-9029-4821-a656-7cc5830afb11",{"type":27,"summary":1275},[1276,1277,1278,1279],"Humans are the easiest thing to hack, so make sure not to let your guard down","Phishing attempts will play on your emotions, using urgency, pity, or a sense of danger","If in doubt, always check the email address of the person sending you an email","When it comes to phishing, always trust your gut – if it feels off, it probably is",{"id":1281,"data":1282,"type":54,"maxContentLevel":27,"version":24},"e96d72c1-1ded-4f8a-b94c-3f8746644dd9",{"type":54,"intro":1283},[1284,1285],"What are some tell-tale signs of a phishing email?","How can you verify the legitimacy of a sender's address?",[1287,1300,1317,1322,1337],{"id":1288,"data":1289,"type":24,"maxContentLevel":27,"version":24,"reviews":1292},"eabc0e95-193e-40cb-bcd0-392e9aa1185a",{"type":24,"contentRole":42,"markdownContent":1290,"audioMediaId":1291},"Another essential part of cybersecurity is knowing how to keep yourself safe from **social engineering**.\n\nIt doesn't matter how secure your system is – if a cyber criminal manages to trick you into entering your personal details into a fake website, or making a bank transfer into a fake account, all your other defenses will be wasted.\n\nThese types of attack are getting more and more common. Why? As technology gets better and better at keeping out threats, a lot of cyber criminals are realizing that human beings are the easiest thing to hack.","a9396d26-aa3a-4185-bb2d-e9a2d87fb022",[1293],{"id":1294,"data":1295,"type":73,"version":24,"maxContentLevel":27},"022db4cb-b724-43b9-a418-69c17f5381f4",{"type":73,"reviewType":136,"spacingBehaviour":24,"clozeQuestion":1296,"clozeWords":1298},[1297],"As technology gets better at keeping out threats, cyber criminals are realizing that humans are easier to hack.",[1299],"humans",{"id":1301,"data":1302,"type":24,"maxContentLevel":27,"version":24,"reviews":1305},"3ad9bf5c-d723-4a2c-a55c-c3378f8af537",{"type":24,"contentRole":42,"markdownContent":1303,"audioMediaId":1304},"Back in the day, you could spot a phishing email a mile away. Bad grammar, weird spelling, low-quality images. But now? They're often using high-quality images, sophisticated language, and more.\n\nSo how do you spot these scams? One tell-tale sign is a sense of **danger** or **urgency**. Phishing scams often play on your emotions, trying to panic you into making mistakes. If an email uses words like 'urgent!' or 'immediately!', take a moment to think things through.\n\nThey might also play on other emotions, like curiosity, sympathy or guilt. If an email talks about 'needing your help', it's often a big red flag.\n\n![Graph](image://93126d3f-d9aa-46e0-8561-19d78768c930 \"Phishing email. Image: Chris Lappas, CC BY-SA 4.0 \u003Chttps://creativecommons.org/licenses/by-sa/4.0>, via Wikimedia Commons\")","3362452d-f85c-4865-81d2-761afdacb345",[1306],{"id":1307,"data":1308,"type":73,"version":24,"maxContentLevel":27},"be4127b8-fe2e-47bf-8ab8-a7c50f7022a8",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":1309,"multiChoiceCorrect":1311,"multiChoiceIncorrect":1313,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6},[1310],"Of these options, which one is the most reliable indicator of a phishing attempt?",[1312],"The message plays on your emotions",[1314,1315,1316],"The message uses bad spelling and grammar","The message was sent from another country","The message doesn't have any images",{"id":1318,"data":1319,"type":24,"maxContentLevel":27,"version":24},"24b166db-e38a-452d-a822-8bb84c8e699d",{"type":24,"contentRole":42,"markdownContent":1320,"audioMediaId":1321},"Another sign of a phishing attack is **vagueness**: in a lot of cases, the attacker won't refer to you by name.\n\nIn addition to this, they might not quote a customer number, or an account ID, like you'd expect to see at the top of emails from a lot of reputable sources. Things like this are easy to miss – but it's always worth keeping an eye on.\n\nHaving said that, this vagueness isn't 100% reliable. In a spear phishing attack, a hacker might look you up on Facebook, or find you on LinkedIn, before sending you a personalized email.\n\nIn other words, while vagueness is often a sign of phishing, not all phishing emails will be vague.","53d770f7-e4f9-4097-94be-15f55793a58b",{"id":1323,"data":1324,"type":24,"maxContentLevel":27,"version":24,"reviews":1327},"ed439228-938c-4fb1-aeac-d8900e45a2e2",{"type":24,"contentRole":42,"markdownContent":1325,"audioMediaId":1326},"Another sign of a phishing email is an email address, or a URL, that doesn't look quite right.\n\nAn email from an official source, like an online bank, will always be sent from a **legitimate address**, often with the company's name included *after* the @ sign. For example, an email from the Bank of England might have an address like customersupport@bankofengland.co.uk.\n\nIt will never be sent from customersupport@gmail.com, or bankofengland@aol.com, or something completely strange and random like 1242rwFfetefwa@3rgsdg.com.\n\nWhenever you receive an email, you can double check the sender's address by hovering over their name. This approach isn't perfect, as some hackers can fake legitimate addresses, but it's always worth a check.","4a19ca19-ef48-4eac-bd2d-c1715dbf4e89",[1328],{"id":1329,"data":1330,"type":73,"version":24,"maxContentLevel":27},"8f36e10a-1a9f-4e0f-9bc0-3e98a29576ff",{"type":73,"reviewType":42,"spacingBehaviour":24,"binaryQuestion":1331,"binaryCorrect":1333,"binaryIncorrect":1335},[1332],"You receive an email from customersupport@gmail.com, claiming to be from your bank. Why is this unlikely to be legitimate?",[1334],"Most official emails will include a company name after the @ sign",[1336],"Most official emails will include a company name before the @ sign",{"id":1338,"data":1339,"type":24,"maxContentLevel":27,"version":24,"reviews":1342},"66f005f5-1644-430d-bae5-0d29249e2c3d",{"type":24,"contentRole":42,"markdownContent":1340,"audioMediaId":1341},"On top of all this, sometimes spotting an attempt at social engineering will rely on some kind of **gut feeling**.\n\nYou just got a phone call that *sounds* like your bank... but does it really feel right when they ask you to tell them your PIN? Or you just got a message from what *looks* like your colleague... but is it really normal that they're asking you to send them money?\n\nIf ever something feels a bit strange, there's a good chance you're dealing with a phishing attack. Just hang up the call, or close the email. Then get in touch with your bank, or colleague, via an official channel instead.\n\nYou could also boot up Google. You may discover that other people have received the same email, or been phoned by the same number – phishers often try their luck on thousands of people at a time.\n\n![Graph](image://137f5fcc-63ee-46f2-87fc-a38c17590818 \"Trust your gut. Image: via Pexels\")","07652d94-653d-480a-95b3-95da78f450b0",[1343,1354],{"id":1078,"data":1344,"type":73,"version":24,"maxContentLevel":27},{"type":73,"reviewType":27,"spacingBehaviour":24,"collapsingSiblings":1345,"multiChoiceQuestion":1346,"multiChoiceCorrect":1348,"multiChoiceIncorrect":1349,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6,"matchPairsQuestion":1350,"matchPairsPairs":1351},[1073,1076,1077],[1347],"Which of these is a hacking technique that manipulates human emotions?",[451],[1082,1084,1085],[252],[1352],{"left":451,"right":1353,"direction":27},"Manipulates human emotions",{"id":1355,"data":1356,"type":73,"version":24,"maxContentLevel":27},"6ebd5220-d9e2-4b1e-8d83-82ef593e150b",{"type":73,"reviewType":24,"spacingBehaviour":24,"activeRecallQuestion":1357,"activeRecallAnswers":1359},[1358],"What two steps should you take if you receive a phone call or email that feels a bit strange?",[1360,1361],"Hang up the call or close the email","Get in touch again via an official channel",{"id":1363,"data":1364,"type":42,"version":27,"maxContentLevel":27,"summaryPage":1366,"introPage":1373,"pages":1379},"5a612977-7a31-48b7-bce6-a272111eade9",{"type":42,"title":1365},"Social media",{"id":1367,"data":1368,"type":27,"maxContentLevel":27,"version":24},"0d89ee5c-01d1-4451-8f99-0389f34bed7a",{"type":27,"summary":1369},[1370,1371,1372],"Social media often contains lots of personal information which a hacker can use against you","Adjust your privacy settings in order to keep your social media safe from prying eyes","Not all 'friends' are friendly, so beware of friend requests from strangers",{"id":1374,"data":1375,"type":54,"maxContentLevel":27,"version":24},"c97a8f0b-97f6-4b62-b5d4-b4ff40cf3811",{"type":54,"intro":1376},[1377,1378],"Why is social media such a gold mine for hackers?","What steps can you take to secure your accounts?",[1380,1396,1409,1426],{"id":1381,"data":1382,"type":24,"maxContentLevel":27,"version":42,"reviews":1385},"1bb7b0c9-38e3-425a-84a9-6f814710acb9",{"type":24,"contentRole":42,"markdownContent":1383,"audioMediaId":1384},"We've already mentioned spear phishing a few times – when a cyber criminal takes the time to find out some details about you, before using these details to contact you with a targeted, personalized attack.\n\nThey might refer to you directly by name. They might pretend to be your employer, or a childhood friend. They might talk about a holiday you went on last year, or mention your wedding day, or use a hundred other personalized tricks to lull you into a false sense of security.\n\nBut how do they get all these personal details? In a lot of cases, their source is **social media**.\n\n![Graph](image://0bfd1412-2216-487c-9732-9dc4c4887425 \"Social media. Image: via Pexels\")","ab3e4e86-b73a-4f07-b222-816ee868dc26",[1386],{"id":1387,"data":1388,"type":73,"version":24,"maxContentLevel":27},"fc13044f-0793-4b2e-81ac-41eb46e4b1cd",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":1389,"multiChoiceCorrect":1391,"multiChoiceIncorrect":1392,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6},[1390],"What is the main source of personal details for cyber criminals attempting spear phishing?",[1365],[1393,1394,1395],"Email chains","Personal diaries","Phone calls",{"id":1397,"data":1398,"type":24,"maxContentLevel":27,"version":42,"reviews":1401},"8ca24c89-48b5-436c-a465-ed3541271e55",{"type":24,"contentRole":42,"markdownContent":1399,"audioMediaId":1400},"Social media leaves a **digital footprint**. This is all the information you've shared online, like your posts, comments, likes, photos, and friends.\n\nYou really don't want this information to fall into the hands of a hacker. Along with spear phishing, they might use your digital footprint to work out the answer to security questions on your private accounts, like your mother's maiden name, or the breed of your childhood dog.\n\nTo stop this from happening, you need to change the privacy settings on all your social media. Set your account to be visible only to your friends or direct connections. This can really help to keep your personal information from falling into the wrong hands.\n\n![Graph](image://468cb2aa-cba2-4648-ad56-030fedd998ba \"What info do you share on LinkedIn? Image: via Pexels\")","40013658-71d9-4755-b3df-51094fee59de",[1402],{"id":1403,"data":1404,"type":73,"version":24,"maxContentLevel":27},"5219580d-69d3-452b-a9c6-6e06a99502e4",{"type":73,"reviewType":24,"spacingBehaviour":24,"activeRecallQuestion":1405,"activeRecallAnswers":1407},[1406],"What privacy settings should you use on social media?",[1408],"Only friends can see your information",{"id":1410,"data":1411,"type":24,"maxContentLevel":27,"version":24,"reviews":1414},"00f7c6d3-7df7-4ad0-9d9e-dda34f26face",{"type":24,"contentRole":42,"markdownContent":1412,"audioMediaId":1413},"Privacy settings are helpful, but they'll never be 100% secure. Ultimately, when you're using social media, you need to always be careful not to share information that you wouldn't want a hacker to get hold of.\n\nFor example, an existing friend might be using a weak password on their social media account. If this account gets hacked, then the hacker can use your friend's account to look at your 'friends only' information.\n\nAnd keep an eye out for **suspicious friend requests**. If a stranger adds you, and you let them inside? Suddenly, they've bypassed your privacy settings. If they're a hacker, they can use this against you.","a92eaf59-82ea-46ba-9a87-2c6bdd8605e1",[1415],{"id":1416,"data":1417,"type":73,"version":24,"maxContentLevel":27},"9f748c8a-304e-46be-9a08-e1942e5186c8",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":1418,"multiChoiceCorrect":1420,"multiChoiceIncorrect":1422,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6},[1419],"Why should you be careful about accepting friend requests from strangers?",[1421],"They can bypass your privacy settings",[1423,1424,1425],"They can spam your timeline","They can unfriend your friends","They can delete your posts",{"id":1427,"data":1428,"type":24,"maxContentLevel":27,"version":27,"reviews":1431},"39c3f769-0182-4559-945b-b4092a9691a4",{"type":24,"contentRole":42,"markdownContent":1429,"audioMediaId":1430},"In addition to all this, make sure to protect your social media account with strong passwords and multi-factor authentication.\n\nBy now, hopefully this goes without saying – but some of us made our social media accounts when we were barely older than children, and we might have been using the same (weak) password ever since.\n\n**Login notifications** are also worth enabling. This helpful setting will give you a heads up via text or email if someone ever tries to log into your account from an unfamiliar device. It's a quick little step that makes your system more secure.\n\n![Graph](image://c6299231-a726-4a32-8c4d-5f42293d6872 \"Facebook log-in. Image: Facebook, Public domain, via Wikimedia Commons\")","2ea1c5e2-660b-4cb5-b28f-3b24f4c07654",[1432],{"id":1433,"data":1434,"type":73,"version":27,"maxContentLevel":27},"7993d515-30c8-43cf-aca1-3396df53d17f",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":1435,"multiChoiceCorrect":1437,"multiChoiceIncorrect":1439},[1436],"Which social media setting gives you a heads up if someone signs in from a strange device?",[1438],"Log in notifications",[1440,1441,1442],"Log out notifications","You get a notification every time you post something","You get a notification every time someone likes your post",{"id":1444,"data":1445,"type":42,"version":42,"maxContentLevel":27,"summaryPage":1447,"introPage":1455,"pages":1461},"8d599d15-c9a0-4605-a062-a3e1c6023322",{"type":42,"title":1446},"Insider threats",{"id":1448,"data":1449,"type":27,"maxContentLevel":27,"version":24},"e7d55137-17db-4d30-9dca-d6a18c58c67e",{"type":27,"summary":1450},[1451,1452,1453,1454],"Insider threats are people who also have access to your personal systems","Intentional threats might breach these systems on purpose – for example, disgruntled employees","Unintentional threats might breach these systems by accident – for example, a naive housemate","Raise awareness of cybersecurity if you want to reduce the chances of insider threats",{"id":1456,"data":1457,"type":54,"maxContentLevel":27,"version":24},"d2805c22-12a0-4cea-ae6a-a33e4cd86346",{"type":54,"intro":1458},[1459,1460],"What's the difference between intentional and unintentional insider threats?","How can you minimize the risk of insider threats?",[1462,1475,1490,1506],{"id":1463,"data":1464,"type":24,"maxContentLevel":27,"version":24,"reviews":1467},"926ea0bb-dc95-4e08-bd9e-0e1f172d0075",{"type":24,"contentRole":42,"markdownContent":1465,"audioMediaId":1466},"When we're trying to maximize our cybersecurity, we need to be aware of something called **insider threats**.\n\nAn insider threat is a second person, other than yourself, who also has access to your systems. Maybe you share your home computer with a partner, or a couple of children. Or maybe you share your Wi-Fi network with a housemate, or parents, or grandparents.\n\nAt first glance, it all sounds innocent enough. But any one of these people could be a risk to your cybersecurity.\n\n![Graph](image://da228a9a-5186-4109-9ddf-2cc1ee9162a9 \"Insider threat. Image: via Pexels\")","db013eae-afcf-42f5-b2b8-493f3ccf43a0",[1468],{"id":1469,"data":1470,"type":73,"version":24,"maxContentLevel":27},"2f33c409-2ef1-47cf-819b-0ad49ad7c986",{"type":73,"reviewType":24,"spacingBehaviour":24,"activeRecallQuestion":1471,"activeRecallAnswers":1473},[1472],"What is an insider threat?",[1474],"A person other than yourself who has access to your systems",{"id":1476,"data":1477,"type":24,"maxContentLevel":27,"version":24,"reviews":1480},"2bc31956-732a-4a67-a37e-0da0f443074e",{"type":24,"contentRole":42,"markdownContent":1478,"audioMediaId":1479},"Insider threats can be divided into two different categories: **intentional** and **unintentional**.\n\nIntentional insider threats are usually associated with companies and governments, rather than personal computer users. Imagine an employee who accepts a bribe from a hacker, and agrees to install a piece of spyware on their company's private system. Or another employee, who's just been laid off, and deletes an important company file as a final act of spite.\n\nImportantly, both of these malicious employees have access to the company computer system. They know the passwords, they have a way inside – and that's what makes them such a threat.\n\nThere are plenty of real-life examples of this. In 2023, two former employees from Tesla leaked thousands of company documents to a German newspaper. Tesla’s cybersecurity was robust, but these insiders let them down.","2ef78387-d270-4cae-9e20-edf575df574a",[1481],{"id":1482,"data":1483,"type":73,"version":24,"maxContentLevel":27},"a2366f75-1a4c-4a15-895a-42a7baf21eef",{"type":73,"reviewType":42,"spacingBehaviour":24,"binaryQuestion":1484,"binaryCorrect":1486,"binaryIncorrect":1488},[1485],"Which of these is an example of an intentional insider threat?",[1487],"An employee who accepts a bribe to install malware",[1489],"An employee who clicks on a phishing email",{"id":1491,"data":1492,"type":24,"maxContentLevel":27,"version":42,"reviews":1495},"f1a8ecd5-45d5-422e-913d-c214d472b33f",{"type":24,"contentRole":42,"markdownContent":1493,"audioMediaId":1494},"In most cases, a personal computer user won't need to worry about intentional insider threats. But **unintentional** insider threats are a very different story.\n\nImagine that one of your kids is using your computer. They receive a phishing email while your back is turned, and click on a dangerous link. Suddenly, your system is infected with malware. That's a prime example of an unintentional insider threat.\n\nOr imagine that a friend comes to stay the night, and logs onto your private Wi-Fi. They don't realize that their laptop has a worm on it – a worm that uses this network connection to jump onto your systems too.\n\nNegligence is also a problem. Your partner might ignore a reminder to update their software. Before you know it, a virus has entered your home.","d2505235-fe19-49ea-8291-b3cf326f35d2",[1496],{"id":1497,"data":1498,"type":73,"version":42,"maxContentLevel":27},"073b7913-5f68-4935-8e1c-09165df71e8b",{"type":73,"reviewType":42,"spacingBehaviour":24,"binaryQuestion":1499,"binaryCorrect":1501,"binaryIncorrect":1503,"multiChoiceIncorrect":1505},[1500],"Which of these is an example of an unintentional insider threat?",[1502],"A child who opens a trojan disguised as a video game",[1504],"A child who deletes important files to spite their parents",[1504],{"id":1507,"data":1508,"type":24,"maxContentLevel":27,"version":24,"reviews":1511},"9e5446ad-dead-42fa-98cc-fa88894a1cd9",{"type":24,"contentRole":42,"markdownContent":1509,"audioMediaId":1510},"So, how do we deal with all this? It often comes down to **awareness**.\n\nYou need to make sure that all the people who have access to your system – whether that's friends, or family, or just random house mates – have a solid understanding of cybersecurity.\n\nThe more they know, the less likely they are to make a mistake that brings your systems down. Tell them about strong passwords, auto-updates, phishing scams and more. Even ask them to do this pathway!\n\nIn addition, it's always important to control which users have access to what. For example, if your kids are using your laptop, make sure they're always using an account that doesn't have admin privileges. That way, even if they do slip up, it should limit the total damage.\n\n![Graph](image://5b8f8b3b-9d50-40e9-a639-858e0497ef9c \"Explain cybersecurity to a partner. Image: via Pexels\")","6819eb95-d8a2-46f7-ad34-a766e30ce10e",[1512],{"id":1513,"data":1514,"type":73,"version":24,"maxContentLevel":27},"1eb72b47-724b-4846-80d8-042c735bd5d3",{"type":73,"reviewType":24,"spacingBehaviour":24,"activeRecallQuestion":1515,"activeRecallAnswers":1517},[1516],"What are two ways to reduce the risk of unintentional insider threats?",[1518,1519],"Increase awareness about cybersecurity among your friends and family","Control which users have access to what on your systems",{"id":1521,"data":1522,"type":42,"version":24,"maxContentLevel":27,"summaryPage":1524,"introPage":1531,"pages":1537},"4187468e-202e-4e23-9dce-a6d5b4982530",{"type":42,"title":1523},"Futureproofing",{"id":1525,"data":1526,"type":27,"maxContentLevel":27,"version":24},"9ca0d4bd-cf83-4845-b406-1ad59eb4bbbd",{"type":27,"summary":1527},[1528,1529,1530],"AI vishing is a modern threat, using deepfake voices to trick people","By establishing a safe-word, or asking personal questions, you can often spot AI vishing","AI isn't all bad news, as it's also being used to establish stronger defenses against cyber attackers",{"id":1532,"data":1533,"type":54,"maxContentLevel":27,"version":24},"244d2381-f269-487f-a569-a0be88d74ac5",{"type":54,"intro":1534},[1535,1536],"Why is AI vishing so frightening?","Is the future all doom and gloom?",[1538,1555,1571,1588],{"id":1539,"data":1540,"type":24,"maxContentLevel":27,"version":24,"reviews":1543},"905d9c6d-b68f-4d2f-94c5-39c644a69058",{"type":24,"contentRole":42,"markdownContent":1541,"audioMediaId":1542},"Cybersecurity is a fast-evolving landscape. Hackers are constantly inventing new ways to attack your system – and you need to work hard to keep track of these changes, and keep yourself one step ahead.\n\nOne change we've seen, over the last couple of years, is the rise of **artificial intelligence**.\n\nFor example, hackers have started using a malicious tool called WormGPT, which lets them write viruses or phishing emails with the help of generative AI. Other types of AI have been used to speed up bruteforcing attacks, significantly increasing the rate at which a weaker password might be cracked.\n\n![Graph](image://f38c8688-f095-4e2d-bbc9-53206c98802c \"pasted-image.png\")","9ff91f00-89a8-4e13-aadc-65b9f48e85d8",[1544],{"id":1163,"data":1545,"type":73,"version":24,"maxContentLevel":27},{"type":73,"reviewType":27,"spacingBehaviour":24,"collapsingSiblings":1546,"multiChoiceQuestion":1547,"multiChoiceCorrect":1549,"multiChoiceIncorrect":1550,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6,"matchPairsQuestion":1551,"matchPairsPairs":1552},[1158,1161,1162],[1548],"Which of these is an AI tool that a hacker might use to write malware?",[1171],[1167,1169,1170],[252],[1553],{"left":1171,"right":1554,"direction":27},"Tool for writing malware",{"id":1556,"data":1557,"type":24,"maxContentLevel":27,"version":24,"reviews":1560},"5d1196b0-d114-4afd-90d3-59d92779f90e",{"type":24,"contentRole":42,"markdownContent":1558,"audioMediaId":1559},"Perhaps the most frightening recent development is the rise of **AI vishing**.\n\nVishing, or voice-phishing, uses voice messages and phone calls as opposed to texts or emails. A few years ago, vishing was hard to pull off – but with the help of AI, and deepfake technology, these scams are now much more effective.\n\nA hacker might use an AI voice that sounds exactly like one of your loved ones. They will use this voice to phone you up, and engage in a conversation. At the end of the conversation, they might ask a quick question: \"by the way, can you remind me of my PIN number?\"","2221861c-68d2-41c6-8d85-a51044f92223",[1561],{"id":1562,"data":1563,"type":73,"version":24,"maxContentLevel":27},"311f42c2-406b-4021-b131-846d34cc5b42",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":1564,"multiChoiceCorrect":1566,"multiChoiceIncorrect":1568,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6},[1565],"Which innovation has made vishing much more dangerous?",[1567],"Deepfakes",[1569,1570,1171],"Supercomputers","Cryptocurrency",{"id":1572,"data":1573,"type":24,"maxContentLevel":27,"version":24,"reviews":1576},"9ccf3d71-9afd-4097-a301-8c304356f92b",{"type":24,"contentRole":42,"markdownContent":1574,"audioMediaId":1575},"One of the most extreme examples of AI vishing took place in Hong Kong, at the start of 2024.\n\nAn employee at a company was invited to a video call with a number of senior colleagues. One of these colleagues asked the employee to transfer several millions dollars from one account to another. But this colleague (and all of the others in the call) were actually AI deepfakes.\n\nAs incidents like this get more and more common, new strategies will need to be implemented. For example, maybe you could establish a **safe-word** with your friends, family, and colleagues. If they ask you for something like a password, or a bank transfer, get them to confirm this safe-word before proceeding.\n\nAlternatively, you could ask them a **personal question** that a scammer wouldn't know the answer to. “Sure, I’ll tell you that information… but first, do you remember how we met?”\n\n![Graph](image://cbad06be-89bb-4106-b5b0-8d52f1db87b9 \"pasted-image.png\")","07928fe5-4a83-4025-8a48-925cdb01a110",[1577],{"id":1578,"data":1579,"type":73,"version":24,"maxContentLevel":27},"1c994251-f060-4562-afca-b7ce56c45fbe",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":1580,"multiChoiceCorrect":1582,"multiChoiceIncorrect":1584,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6},[1581],"If you receive a call from a loved one, asking for a password, what should you do?",[1583],"Check their identity with a personal question",[1585,1586,1587],"Tell them the password","Hang up immediately","Report the call to the police",{"id":1589,"data":1590,"type":24,"maxContentLevel":27,"version":24,"reviews":1593},"18309cea-9417-4195-a8b3-f0247949c5f6",{"type":24,"contentRole":42,"markdownContent":1591,"audioMediaId":1592},"On a more positive note, AI is also being used to improve our defenses against cyber attacks. It can analyze huge amounts of data for threats, which means our cybersecurity solutions are getting better at spotting and stopping risks.\n\nFor example, towards the end of 2023, Google added a new AI spam filter to Gmail. It detects phishing emails almost 40% better than before.\n\nUltimately, cybersecurity is a battleground. On one side, hackers are using new technologies to improve their attacks. But on the other side, companies are using these technologies to build more powerful defenses.","4de40118-4656-4302-bf15-ce9b0101764f",[1594],{"id":1595,"data":1596,"type":73,"version":24,"maxContentLevel":27},"5b8074b2-af1b-4eff-bcd4-0aa5d200d929",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":1597,"multiChoiceCorrect":1599,"multiChoiceIncorrect":1601,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6},[1598],"Towards the end of 2023, Google used AI to improve Gmail. But what does this AI do?",[1600],"It detects phishing emails",[1602,1603,1604],"It detects malware","It autocorrects typos","It links you to suggested contacts",{"id":1606,"data":1607,"type":42,"version":27,"maxContentLevel":27,"introPage":1609,"pages":1614},"96254b6d-0177-4ff6-ba6b-b122a2fa2853",{"type":42,"title":1608},"Case study: Vishing",{"id":1610,"data":1611,"type":54,"maxContentLevel":27,"version":24},"23d5fda7-1240-46df-aa32-36b25f43980d",{"type":54,"intro":1612},[1613],"What do vishing attacks actually look like?",[1615,1620,1625],{"id":1616,"data":1617,"type":24,"maxContentLevel":27,"version":27},"e0976832-62a7-440f-a78b-70c093976f53",{"type":24,"contentRole":42,"markdownContent":1618,"audioMediaId":1619},"*The following text is a fictional article about a real-life vishing attack.*\n\n**Employee Targeted By Deepfake**\\\nApril 11, 2024\n\n![Graph](image://703cdf07-9d29-41cf-b765-826bfbde4d96 \" \")\n\nThis week, an unsuspecting LastPass employee found himself at the center of a vishing scam.\n\nThe employee, whose identity remains confidential, was targeted by a scammer using advanced deepfake technology. The scammer, posing as the CEO of LastPass, tried to trick the employee into revealing company information.\n\nThe scammer approached the employee over WhatsApp, using urgent voice notes and messages.","22ab74bb-1f46-495d-80bf-30fa0f152bfe",{"id":1621,"data":1622,"type":24,"maxContentLevel":27,"version":24},"c45f007f-7675-4ec6-8557-af6599b384ea",{"type":24,"contentRole":42,"markdownContent":1623,"audioMediaId":1624},"The employee found it suspicious that the messages were sent over WhatsApp, rather than usual working channels.\n\nThey also noticed forced urgency in the messages, a common hallmark of social engineering.\n\n\"Our employee rightly ignored the messages and reported the incident to our internal security team,\" said LastPass in a public statement. \"There was no impact to our company. However, we did want to share this incident to raise awareness.\"","ac71adbe-8923-4795-aa63-6f5f9c1c612d",{"id":1626,"data":1627,"type":24,"maxContentLevel":27,"version":24,"reviews":1630},"e0d04963-1ebe-4cb7-911b-78e098f29ba5",{"type":24,"contentRole":42,"markdownContent":1628,"audioMediaId":1629},"In the case of LastPass, the vishing attempt was unsuccessful, but other companies have been caught out.\n\nIn February, Hong Kong police reported a deepfake video call that convinced an employee at a multinational firm to send fraudsters $25 million.\n\nThis video call had a number of attendants, including the chief financial officer and other senior staff members. But all of these attendants were deepfaked, apart from the one employee targeted by the high-tech scam.","5ac9dbd7-803a-442b-9430-ebc37284ea87",[1631],{"id":1632,"data":1633,"type":73,"version":24,"maxContentLevel":27},"405ddfa4-7be1-477b-a983-eebcddc99a23",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":1634,"multiChoiceCorrect":1636,"multiChoiceIncorrect":1638,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6},[1635],"Which of these tricks can hackers pull off using modern deepfake technology? ",[1637],"Both of these are possible",[1639,1640,1641],"They can phone you with a fake voice","They can video call you with a fake face","Neither of these are possible",{"id":1643,"data":1644,"type":29,"maxContentLevel":37,"version":27,"orbs":1647},"32956c2e-c08c-4ae5-9f0d-e664a5d86b68",{"type":29,"title":1645,"tagline":1646},"Response and Recovery","Learn how to react if your digital fortress is breached",[1648,1703],{"id":1649,"data":1650,"type":42,"version":27,"maxContentLevel":37,"summaryPage":1652,"introPage":1659,"pages":1665},"f7191be7-1e76-4774-b8d6-319b6327de2c",{"type":42,"title":1651},"Warning signs",{"id":1653,"data":1654,"type":27,"maxContentLevel":27,"version":24},"a1d9f4c6-6aee-4dea-9fe7-8fda029df44c",{"type":27,"summary":1655},[1656,1657,1658],"A sudden slow-down in performance could mean malware is hogging your system","An unexpected increase in network usage is another big red flag","New toolbars, programs, or changes in system settings could also signal a breach",{"id":1660,"data":1661,"type":54,"maxContentLevel":27,"version":24},"34f31485-4a59-4369-b289-654ca57999ce",{"type":54,"intro":1662},[1663,1664],"Why are performance issues often a sign of a security breach?","What other signs might indicate that your system has been attacked?",[1666,1671,1688],{"id":1667,"data":1668,"type":24,"maxContentLevel":27,"version":24},"9c010934-78eb-4309-ac71-161f143b730c",{"type":24,"contentRole":42,"markdownContent":1669,"audioMediaId":1670},"At the end of all this, you should have built yourself a robust defensive system. Strong passwords, encryption, adblockers, VPNs – you've got all kinds of tools at your disposal.\n\nBut remember: even the best defenses can't keep everything out.\n\nBecause of that, it's also important to know how to spot the warning signs that your personal system has been breached. Catching these signs early can make a massive difference, letting you jump into action and lock things down before hackers can cause too much damage.\n\n![Graph](image://8215e28d-4b40-4f55-8bdd-217aafc0c79c \"Always be vigilant. Image: via Pexels\")","8d46c7cb-2652-40a6-8964-42a060ed2a06",{"id":1672,"data":1673,"type":24,"maxContentLevel":27,"version":24,"reviews":1676},"8632d6cb-0815-401c-bd61-3a5d9ec21f11",{"type":24,"contentRole":42,"markdownContent":1674,"audioMediaId":1675},"One of the first things you might notice, if your system has been breached, is a major slow-down in performance. Maybe it's taking forever to open system programs, or you're having a hard time loading your files.\n\nThis is a tell-tale sign that some nasty malware is running behind the scenes. It's hogging all your system's resources, and not leaving much spare for the programs you're trying to run. In worst case scenarios, your system will start crashing, or you'll see a dreaded blue screen of death.\n\n![Graph](image://e19b53bc-e304-432c-aee5-a6c6d14e516b \"Blue screen of death. Image: First version by MitrandirLK / Newest version screenshot by PantheraLeo1359531 idk, Public domain, via Wikimedia Commons\")\n\nAnd let's not forget about network usage. If you notice an increase in the data coming in and out of your computer, that's often a big red flag.","4655fee3-0974-470e-8dae-6f61a852d10f",[1677],{"id":1678,"data":1679,"type":73,"version":24,"maxContentLevel":27},"05f45c72-04fd-42b4-a8d7-5c941d5e3244",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":1680,"multiChoiceCorrect":1682,"multiChoiceIncorrect":1684,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6},[1681],"Which notorious screen is a tell-tale sign of an infected system?",[1683],"Blue screen of death",[1685,1686,1687],"Green screen of death","Red screen of death","Black screen of death",{"id":1689,"data":1690,"type":24,"maxContentLevel":37,"version":27,"reviews":1693},"6a77472c-a985-4fc1-bb35-3d0b7dc4d42a",{"type":24,"contentRole":42,"markdownContent":1691,"audioMediaId":1692},"You should also watch out for strange new arrivals on your system. You might find new toolbars in your browser, which you don't remember putting there, or find programs popping up when you start your computer that you've never seen before.\n\nChanges in your files or system settings can also be a sign of a breach. Hackers might turn off security settings, or make a new account with admin privileges, or set up backdoors so that they can access your system again later.\n\nBasically, if anything changes without warning, it's usually worth investigating. Always stay on the lookout for suspicious signs, and be ready to spring into action.","8c85cbfc-478d-43a9-8464-570790b98b29",[1694],{"id":1695,"data":1696,"type":73,"version":27,"maxContentLevel":37},"db6f30a9-47e5-40bc-a97c-888386a25f13",{"type":73,"reviewType":24,"evolvingBehavior":24,"spacingBehaviour":24,"activeRecallQuestion":1697,"activeRecallAnswers":1699},[1698],"What are some signs that your system has been breached?",[1700,1701,1702],"Major slow-down in performance","New toolbars appearing on browser","Changes in your files or system settings",{"id":1704,"data":1705,"type":42,"version":24,"maxContentLevel":27,"summaryPage":1707,"introPage":1715,"pages":1721},"c70bac59-b1b0-482c-ba0d-ea941611aee0",{"type":42,"title":1706},"Removal & recovery",{"id":1708,"data":1709,"type":27,"maxContentLevel":27,"version":24},"5e93d80a-1c2d-4836-a9b3-098a261a36db",{"type":27,"summary":1710},[1711,1712,1713,1714],"If you spot a breach, isolate the device and run a full system scan","Professional support can help with more severe breaches","A factory reset is a nuclear option against cyber threats","After a factory reset, you can restore your system from backups",{"id":1716,"data":1717,"type":54,"maxContentLevel":27,"version":24},"052390ed-a42e-4591-b265-293d006e4be4",{"type":54,"intro":1718},[1719,1720],"What steps should you take when you notice a breach?","Why are backups so important?",[1722,1739,1752,1757],{"id":1723,"data":1724,"type":24,"maxContentLevel":27,"version":24,"reviews":1727},"72e26c29-f619-4a3f-a660-95fa311c1565",{"type":24,"contentRole":42,"markdownContent":1725,"audioMediaId":1726},"If you do ever notice the signs of a cybersecurity breach, it's important not to panic. With the right steps, there might be a way to recover your system.\n\nThe very first thing that you need to do is to **isolate** the affected device. Disconnect it from the Wi-Fi, and make sure it's not physically plugged in to any other devices. Think of this like putting your device in a quarantine zone – it helps to make sure that malware won't be able to spread.\n\n![Graph](image://a449de78-b9c0-4983-a9e2-1aa994f4f6fc \"pasted-image.png\")\n\nAfter that, you should use your antivirus software to run a full system scan. This can help to identify the malware, and maybe even remove it.","761cee64-cc60-4a6f-9777-73e2a70c390f",[1728],{"id":1729,"data":1730,"type":73,"version":24,"maxContentLevel":27},"7f6c6439-7f47-4d6f-8d9e-5142acbeaec7",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":1731,"multiChoiceCorrect":1733,"multiChoiceIncorrect":1735,"multiChoiceMultiSelect":6,"multiChoiceRevealAnswerOption":6},[1732],"What is the first step to take when a cybersecurity breach is noticed?",[1734],"Isolate the affected devices",[1736,1737,1738],"Run a full system scan","Seek professional support","Perform a factory reset",{"id":1740,"data":1741,"type":24,"maxContentLevel":27,"version":24,"reviews":1744},"b2aa8a42-e12a-4704-9404-093d7e3c7464",{"type":24,"contentRole":42,"markdownContent":1742,"audioMediaId":1743},"If your antivirus software fails to detect or resolve the breach, you might also want to seek **professional support**.\n\nSome laptop manufacturers, or antivirus providers, have helplines and live chats that can give you free advice. A few organizations, like the UK's National Cyber Security Center, offer similar services.\n\nIn worst case scenarios, you might need to pay for an IT professional to examine your device, and try to remove the malware. If all else fails, they'll probably suggest a **factory reset**. This process involves completely wiping all the data from your device.","405e6e00-2f40-4734-93d4-0bfa82eccddf",[1745],{"id":1746,"data":1747,"type":73,"version":24,"maxContentLevel":27},"f49a6e53-aef1-4d3e-a5bc-de6fae45e739",{"type":73,"reviewType":24,"spacingBehaviour":24,"activeRecallQuestion":1748,"activeRecallAnswers":1750},[1749],"When might professional support be needed in the event of a cybersecurity breach?",[1751],"When your antivirus software fails to fix the breach",{"id":1753,"data":1754,"type":24,"maxContentLevel":27,"version":24},"a5d21b0c-9e45-41b0-94a3-997ae3dcd3d9",{"type":24,"contentRole":42,"markdownContent":1755,"audioMediaId":1756},"A factory reset is a nuclear option. It removes most malware, but only by removing all your files and programmes too.\n\nBut that shouldn't be an issue – not if you've been making lots of encrypted **backups** of your data. After a factory reset, these backups can be used to restore your system to its former state. If you don't have any backups... well. That shouldn't be the case.\n\nYou'll need to restore things carefully, and make sure these backups don't contain a copy of the malware. But even if you're forced to go back a few months, you'll hopefully find yourself a healthy backup that gets your systems going again.","16916c9f-defb-4618-8b24-5167918ace6c",{"id":1758,"data":1759,"type":24,"maxContentLevel":27,"version":24,"reviews":1762},"7b954a6d-3f0d-4832-8702-f01a78712e4c",{"type":24,"contentRole":42,"markdownContent":1760,"audioMediaId":1761},"After restoring your system, it's important to review your security set up, and work out what went wrong last time. Are all your programmes up to date? Is your firewall turned on? You might have overlooked something simple – but you can use this as a chance to learn.\n\nIt's also worth changing your passwords, in case a hacker has kept a record of them, and plans to use them again in the future.\n\nOn top of all this, you need to keep looking out for suspicious activity. Stay sharp and vigilant – it's the best way to make sure that your digital fortress won't be breached again.\n\n![Graph](image://cb4e98ea-6672-4d08-8123-c02ed79abaad \"Your digital fortress. Image: via Pexels \")","5d465e14-9d56-477d-84c8-f1fab98b7fe4",[1763,1772],{"id":1764,"data":1765,"type":73,"version":24,"maxContentLevel":27},"9fe020b7-b758-465d-9f69-89b3a99854f6",{"type":73,"reviewType":42,"spacingBehaviour":24,"binaryQuestion":1766,"binaryCorrect":1768,"binaryIncorrect":1770},[1767],"Is a factory reset a first or last resort option in the event of a cybersecurity breach?",[1769],"Last resort",[1771],"First resort",{"id":1773,"data":1774,"type":73,"version":24,"maxContentLevel":27},"8d2d9040-fbab-4a7a-b375-6bbcb719e462",{"type":73,"reviewType":27,"spacingBehaviour":24,"multiChoiceQuestion":1775,"multiChoiceCorrect":1777,"multiChoiceIncorrect":1781,"multiChoiceMultiSelect":21,"multiChoiceRevealAnswerOption":6},[1776],"What should you do after restoring your system from a backup?",[1778,1779,1780],"Review your security setup","Change your passwords","Stay sharp and vigilant",[1782],"Delete your backup",{"left":4,"top":4,"width":1784,"height":1784,"rotate":4,"vFlip":6,"hFlip":6,"body":1785},24,"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"m9 18l6-6l-6-6\"/>",{"left":4,"top":4,"width":1784,"height":1784,"rotate":4,"vFlip":6,"hFlip":6,"body":1787},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M12.586 2.586A2 2 0 0 0 11.172 2H4a2 2 0 0 0-2 2v7.172a2 2 0 0 0 .586 1.414l8.704 8.704a2.426 2.426 0 0 0 3.42 0l6.58-6.58a2.426 2.426 0 0 0 0-3.42z\"/>\u003Ccircle cx=\"7.5\" cy=\"7.5\" r=\".5\" fill=\"currentColor\"/>\u003C/g>",1778179486004]