Want to create interactive content? It’s easy in Genially!

Get started free

Cybersecurity Awareness Month Trivia 2025

Megan Grandmont-Mele

Created on October 15, 2025

Start designing with a free template

Discover more than 1500 professional designs like these:

Smart Quiz

SWOT Challenge: Classify Key Factors

Geographical Challenge: Drag to the map

Decisions and Behaviors in the Workplace

Process Flow: Corporate Recruitment

Weekly Corporate Challenge

Wellbeing and Healthy Routines

Transcript

Welcome to DTS

Cybersecurity Awareness Month Trivia

Let's go!

Phishing

A: 91%

According to recent data, ~91% of phishing attempts are still delivered via email. Source: Identitytheft.org

A: Flash phishing

Spear phishing: Targeted email attacks Whaling: Executive-targeted scams Quishing: QR code phishing Flash phishing isn't real... yet. Source: fortinet.com

A: 3.1%

This is calculated based on the number of users who reported suspected phishing vs. clicking on a link and/or opening an attachment. It's significantly lower than the industry benchmark (28.4%). Source: DTS KnowBe4 dashboard

AI Threats

A: All of the above!

Generative AI has super-charged classic attack methods by making them faster and more scalable. Source: KnowBe4.com

A: 15 seconds

According to Open AI, their Voice Engine tool can create a convincing clone with just 15 seconds of audio. Lower-end tools need longer audio samples. Source: engadget.com

A: $1.33

The average cost to produce a deepfake may be cheap, but the estimated global cost of deepfake fraud in 2024 was anything but: 1 trillion USD. Source: ibm.com

Ransomware

A: 75 million USD

An undisclosed Fortune 50 company issued this staggering payout to ransomware group Dark Angels in 2024. Previously the largest payout was 40 million USD. Source: ibm.com

A: 66%

This was a decrease from 2023, but still higher than the cross-sector average of 59%. Of the institutions that were attacked, 62% paid the ransom. Source: ibm.com

A: Valuable data + underresourced

Higher ed networks are also complex, with multiple endpoints and devices... lots of potential ways in. Source: ibm.com

Thanks for playing!

Hope you learned something new about cybersecurity!