Last month, the company had to close some of its services after hackers managed to __________ through its firewall., restore essential services, suffer a breach, list sensitive data, detect unusual patterns, Many organizations still use an __________ firewall, which is more vulnerable to cyberattacks., unusual, ageing, hidden, basic, IT teams are trained to monitor __________ in behaviour to detect possible intrusions., digital systems, unusual patterns, long-term recommendations, basic services, After the cyberattack, users could not access even the platform’s __________., hidden risks, outdated routines, basic services, sensitive data, Cybersecurity experts warned the company about potential weaknesses last year, but they ignored the __________., earlier warnings, unusual patterns, hidden risks, ageing firewall, Some companies still rely on __________, which increases the likelihood of a successful cyberattack., long-term recommendations, outdated routines, basic services, digital systems, Hackers stole customers’ financial and personal information, which is considered __________., sensitive data, unusual patterns, basic services, hidden risks, The IT department’s first priority was to __________ after the system was compromised., restore essential services, suffer a breach, monitor outdated routines, ignore earlier warnings, Many cyber risks are not immediately obvious; they are often called __________., hidden risks, digital systems, unusual patterns, ageing firewalls, Until recently, companies believed their __________ were completely safe, but recent attacks proved otherwise., digital systems, sensitive data, unusual patterns, hidden risks.

Leaderboard

Visual style

Options

AI Enhanced: This activity contains content generated by AI. Learn more.

Switch template

)
Continue editing: ?