Do you have what it takes to be a Cyberhero? Answer nine challenging questions to test your cybersecurity savviness and see if you can outwit the cybervillains.
The Cyberhero Game challenge is over. Feel free to play for fun!
Way to start the day off right! Always connect to secure Wi-Fi before entering any personal information online.
Uh oh. That shady-looking character sitting in the corner stole your login information and is using your email address to send out phishing emails to thousands of other Noles.
Not all Wi-Fi is created equal. Sensitive browsing—such as banking or checking your email—should only be done on a secure network that you trust, like FSUSecure. Be careful what you do on public Wi-Fi, including FSUGuest, as it allows easy access to your data.
Way to use your x-ray vision to see through the hoax. You just sent this imposter and her phishing email packing.
Oh no! You just gave a cybercrook access to your account. He’s busy changing your contact info and rerouting your paycheck or financial aid money to a bank in Russia.
Phishing emails are masters of disguise. Be skeptical of messages that contain spelling errors or threaten you will lose something. Before clicking anything, hover over or long tap a link to display the true URL and see if it is linking to a reputable website. When in doubt, contact the ITS Service Desk at 850-644-HELP to verify if an email is legit. And NEVER click a link that looks suspicious.
The cybercrooks will never get past your safety vortex. Good job locking your computer before you step away so that no one else can access your files or accounts.
Tsk tsk. You come back to find that report you were working on deleted. And it looks like someone was poking around your email.
Never leave your command center unattended, no matter where you are. Log out or lock your computer and secure your mobile devices whenever you walk away. Otherwise, you’re giving sneaky strangers free access to your files, photos, conversations and anything else stored on your device.
Nice work, Cyberhero. You know that vigilant monitoring of your accounts’ privacy settings is just as important as being mindful of what you post.
You didn’t lock down your account and a stranger has been following your posts. He knows your phone number, where you work and that you take your friend’s kids to the park every Tuesday evening. #teetertotterselfies #thatssocreepy #weknow
Sharing too much on social media can lead to identity theft or worse. Info you post can be used to crack security questions or track your whereabouts. Limit your profile information, share your posts only with friends and check your security settings often.
KAPOW! WHAM! ZAP! That’s the sound of you stopping cyberthreats dead in their tracks. Good job keeping your passwords unique and top secret.
ARRGHH! Your email got hacked … and your Snapchat, and your Amazon, and your bank account.
If you use the same password for every site and a hacker gets one password, he can infiltrate all of your accounts, creating total cyber mayhem. Use strong, unique passwords for each account. Make passwords hard to guess—include letters, numbers and symbols—and NEVER share them with anyone.
Wow! It looks like someone knows how to properly dispose a mobile device. And if we had to guess, we’d say you already have your new one password protected. 😉
All those photos you thought you deleted are being uploaded online as we speak.
The only way to truly erase data from your phone is to reset it to factory settings. Always make sure to completely wipe your phone before passing it on to someone new, no matter who they are.
Hello. This is the Cyberhero Allstars Committee calling. You just received an award for being awesome. That phishing phone call didn’t stand a chance.
Woo hoo! Someone’s getting a new car! … but it isn’t you. The cybercrook who called you just opened up eight new lines of credit in your name, and now your credit score is shot.
Phishing can take on many forms: emails, websites and even phone calls. Avoid providing personal information over the phone, especially from an unsolicited call. And remember: if an offer sounds too good to be true, it probably is.
Purchase approved. You know to shop from secure and trusted websites and use a low-limit credit card for online purchases.
Yikes! You also just bought an Easy-Bake oven, plane ticket to Pyongyang and zero-turn lawnmower. Looks like someone lifted your credit card info and did some major shopping at your expense.
Don’t be swindled by cybercrooks. Only shop from secure sites with https in the address line and use a separate credit card with a low credit limit for online purchases.
Kick back and enjoy your vacation, Cyberhero. You earned it.
[Two weeks later] Oh no! The cybercrooks infiltrated your lair while you were away. Your window is smashed, your TV is gone and your car is missing.
Sharing too much information and posting photos before and during your trip makes you an easy target for #burglary. Be mindful of what you post on social media and wait until you get back to share your travels.
© Florida State University