Cybersecurity Escape Room
Wrap up National Cybersecurity Awareness Month with this fun challenge!
start
October is NationalCybersecurity Awareness Month
Every day we are more and more connected—whether messaging family and friends, shopping online or emailing colleagues. It’s important to take steps to stay safe when using our phones, laptops and smart devices.
Cybersecurity Awareness Month is a global initiative that raises awareness about online safety and empowers individuals and businesses to protect themselves from cybercrime. This year’s theme, Building a Cyber Strong America, highlights the need to strengthen the country's infrastructure against cyber threats, ensuring resilience and security. Learn more about best cybersecurity practices and the themes highlighted during our October 2025 Phishing Tournament through this interactive Escape Room!
Tests
Complete each test to beat the game: there is no other way to escape!
Core Cybersecurity Principles
Cryptocurrency Scams
Brand Impersonation
Social Engineering & Vulnerabilities
Can We CAPTCHA Your Attention?
Final Test: Show What You Know
Core Cybersecurity Principles
1/4
Multifactor Authentication:What is a common method of Multifactor Authentication?
Taking a photo of your Social Security Card
Typing in your creditcard number
Entering a code sent to asecondary account
Scanning your retnia through your device's camera
Core Cybersecurity Principles
2/4
Updating Software:Why is updating your software frequently important?
It allows your device to look modern and up-to-date
Flaws in a system can be easily exploited if not patched
Not doing so would be a violation of the device's Terms of Agreement
Core Cybersecurity Principles
3/4
Think Before You Click:What should you do if you receive a suspicious email?
Stop, Think, and Review the email for red flags - report the email if necessary
Click on the links insideto learn more
Send the email to your teamto collect their opinions
Reply to the email askingfor more information
Core Cybersecurity Principles
4/4
Use Strong Passwords:What practice should you implement when using passwords?
Not recycling the same password across your accounts
Keep all passwords on a Post-It Note for easy access
Not making the password too complex so you can remember it easily
Tests
Complete each test to beat the game: there is no other way to escape!
Core Cybersecurity Principles
Cryptocurrency Scams
Brand Impersonation
Social Engineering & Vulnerabilities
Can We CAPTCHA Your Attention?
Final Test: Show What You Know
Cryptocurrency Scams
1/3
Understanding Why:Why may scammers choose to use Cryptocurrency in their scams?
Cryptocurrency payments do not come with legal protections
Cryptocurrency payments typically are not reversible
Cryptocurrency accounts are not backed by the government.
All of the Above
Cryptocurrency Scams
2/3
Topics of Interest:Which cryptocurrency scam theme has brought in the most revenue?
Romance Scams
Investment RelatedFraud
Government Impersonators
Business Imposters
Cryptocurrency Scams
3/3
Staying Safe:How can you protect yourself against Cryptocurrency Scams?
Believe that everyone has good intent
Reply quickly so you are the only one who gets the offer
Know that if something seems too good to be true, it probably is
Cryptocurrency Scams
Want to learn more?Check out this recent story about Crypto Scams: CNN’s Kyung Lah confronts one crook who tried to steal thousands from her
Tests
Complete each test to beat the game: there is no other way to escape!
Core Cybersecurity Principles
Cryptocurrency Scams
Brand Impersonation
Social Engineering & Vulnerabilities
Can We CAPTCHA Your Attention?
Final Test: Show What You Know
Brand Impersonation
1/3
The Method Behind the Madness:How do threat actors impersonate brands?
Creating a false URL that closely resembles the site's real URL
Messing with the designof the real brand's logo
Using the same communication format as the real brand
All of the Above
Brand Impersonation
2/3
Designed to Trick:Which logo has been modified?
Brand Impersonation
3/3
Did You Know?This is the most impersonated brand, appearing in 32% of brand impersonation phishing attacks.
Microsoft
Apple
Amazon
Google
Tests
Complete each test to beat the game: there is no other way to escape!
Core Cybersecurity Principles
Cryptocurrency Scams
Brand Impersonation
Social Engineering & Vulnerabilities
Can We CAPTCHA Your Attention?
Final Test: Show What You Know
Social Engineering & Vulnerabilities
1/3
Fill in the Blanks:What is Social Engineering?
Social Engineering & Vulnerabilities
2/3
Find the Odd Man Out:Which of the following is NOT one of the key 7 Social Engineering Vulnerabilities?
Greed
Fear
Urgency
Lust
Sociableness
Obedience
Opportunity
Curiosity
Social Engineering & Vulnerabilities
3/3
Understanding Motive:Why do threat actors exploit these vulnerabilities?
It saves them time when brainstorming ideas
To manipulate their victims into making mistakes
Companies never train their employees on how to detect them
Tests
Complete each test to beat the game: there is no other way to escape!
Core Cybersecurity Principles
Cryptocurrency Scams
Brand Impersonation
Social Engineering & Vulnerabilities
Can We CAPTCHA Your Attention?
Final Test: Show What You Know
Can We CAPTCHA Your Attention?
1/3
Initial Intent:What is the purpose of CAPTCHA?
So websites can see how badly you really want to view their site
To make websites more tech savvy
A form of verification online that helps distinguish human users from bots
Can We CAPTCHA Your Attention?
2/3
Why it Works:Why do CAPTCHA attacks work so well?
People typically do not think twice when they are asked to prove they are not a robot.
All of the Above
They exploit "verification fatigue," knowing that since users are so used to verifying their identity, they may click too quickly and miss red flags.
The instructions given seem harmless and simple to follow
Can We CAPTCHA Your Attention?
3/3
Identifying the Signs:What is the biggest red flag to look for with CAPTCHA scams?
If a CAPTCHA asks you to identify planes instead of cars to prove you're human
CAPTCHAs that instruct you to do additional steps beyond typical identity verification tasks or ask you to copy items to your clipboard
If a CAPTCHA does not mix letters and numbers in its verification image
Tests
Complete each test to beat the game: there is no other way to escape!
Core Cybersecurity Principles
Cryptocurrency Scams
Brand Impersonation
Social Engineering & Vulnerabilities
Can We CAPTCHA Your Attention?
Final Test: Show What You Know
Final Test: Show What You Know
1/5
Core Cybersecurity Principles:What is NOT a core cybersecurity principle?
MultifactorAuthentication
Messing with the designof the real brand's logo
Think BeforeYou Click
Update YourSoftware
Practice CyberHygiene
Use StrongPasswords
Final Test: Show What You Know
2/5
Cryptocurrency Scams:Why are cryptocurrency scams becoming the preferred method for financial scams?
Because it is easier to gain money using this method
Because there are less legal protections for cryptocurrency
Because the old methods of financial scams are outdated
Final Test: Show What You Know
3/5
Brand Impersonation:What makes brand impersonation so successful?
The Mandela Effect makes it impossible to identify the true company logo
It exploits a customer's trust they have in the company
Brands are constantly rebranding so changes in branding are nothing to worry about
People are chronically online
Final Test: Show What You Know
4/5
Social Engineering & Vulnerabilities:How many key social engineering vulnerabilities are there?
11
Final Test: Show What You Know
5/5
True or False:Trustworthy CAPTCHAs won't direct you to download software or extensions.
True
False
Completed
Congratulations, you have successfully completed the escape room!
Start over?
Oh oh!
That answer is not correct...
But don't lose your balance, continue on your way and try again!
back
Cybersecurity Escape Room
Sarah
Created on October 16, 2025
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Halloween escape
View
Adventure Breakout
View
Team Building Mission Escape Game
View
Onboarding Escape Game
View
Flags Challenge
View
Museum Escape Room
View
Education Escape Room
Explore all templates
Transcript
Cybersecurity Escape Room
Wrap up National Cybersecurity Awareness Month with this fun challenge!
start
October is NationalCybersecurity Awareness Month
Every day we are more and more connected—whether messaging family and friends, shopping online or emailing colleagues. It’s important to take steps to stay safe when using our phones, laptops and smart devices. Cybersecurity Awareness Month is a global initiative that raises awareness about online safety and empowers individuals and businesses to protect themselves from cybercrime. This year’s theme, Building a Cyber Strong America, highlights the need to strengthen the country's infrastructure against cyber threats, ensuring resilience and security. Learn more about best cybersecurity practices and the themes highlighted during our October 2025 Phishing Tournament through this interactive Escape Room!
Tests
Complete each test to beat the game: there is no other way to escape!
Core Cybersecurity Principles
Cryptocurrency Scams
Brand Impersonation
Social Engineering & Vulnerabilities
Can We CAPTCHA Your Attention?
Final Test: Show What You Know
Core Cybersecurity Principles
1/4
Multifactor Authentication:What is a common method of Multifactor Authentication?
Taking a photo of your Social Security Card
Typing in your creditcard number
Entering a code sent to asecondary account
Scanning your retnia through your device's camera
Core Cybersecurity Principles
2/4
Updating Software:Why is updating your software frequently important?
It allows your device to look modern and up-to-date
Flaws in a system can be easily exploited if not patched
Not doing so would be a violation of the device's Terms of Agreement
Core Cybersecurity Principles
3/4
Think Before You Click:What should you do if you receive a suspicious email?
Stop, Think, and Review the email for red flags - report the email if necessary
Click on the links insideto learn more
Send the email to your teamto collect their opinions
Reply to the email askingfor more information
Core Cybersecurity Principles
4/4
Use Strong Passwords:What practice should you implement when using passwords?
Not recycling the same password across your accounts
Keep all passwords on a Post-It Note for easy access
Not making the password too complex so you can remember it easily
Tests
Complete each test to beat the game: there is no other way to escape!
Core Cybersecurity Principles
Cryptocurrency Scams
Brand Impersonation
Social Engineering & Vulnerabilities
Can We CAPTCHA Your Attention?
Final Test: Show What You Know
Cryptocurrency Scams
1/3
Understanding Why:Why may scammers choose to use Cryptocurrency in their scams?
Cryptocurrency payments do not come with legal protections
Cryptocurrency payments typically are not reversible
Cryptocurrency accounts are not backed by the government.
All of the Above
Cryptocurrency Scams
2/3
Topics of Interest:Which cryptocurrency scam theme has brought in the most revenue?
Romance Scams
Investment RelatedFraud
Government Impersonators
Business Imposters
Cryptocurrency Scams
3/3
Staying Safe:How can you protect yourself against Cryptocurrency Scams?
Believe that everyone has good intent
Reply quickly so you are the only one who gets the offer
Know that if something seems too good to be true, it probably is
Cryptocurrency Scams
Want to learn more?Check out this recent story about Crypto Scams: CNN’s Kyung Lah confronts one crook who tried to steal thousands from her
Tests
Complete each test to beat the game: there is no other way to escape!
Core Cybersecurity Principles
Cryptocurrency Scams
Brand Impersonation
Social Engineering & Vulnerabilities
Can We CAPTCHA Your Attention?
Final Test: Show What You Know
Brand Impersonation
1/3
The Method Behind the Madness:How do threat actors impersonate brands?
Creating a false URL that closely resembles the site's real URL
Messing with the designof the real brand's logo
Using the same communication format as the real brand
All of the Above
Brand Impersonation
2/3
Designed to Trick:Which logo has been modified?
Brand Impersonation
3/3
Did You Know?This is the most impersonated brand, appearing in 32% of brand impersonation phishing attacks.
Microsoft
Apple
Amazon
Google
Tests
Complete each test to beat the game: there is no other way to escape!
Core Cybersecurity Principles
Cryptocurrency Scams
Brand Impersonation
Social Engineering & Vulnerabilities
Can We CAPTCHA Your Attention?
Final Test: Show What You Know
Social Engineering & Vulnerabilities
1/3
Fill in the Blanks:What is Social Engineering?
Social Engineering & Vulnerabilities
2/3
Find the Odd Man Out:Which of the following is NOT one of the key 7 Social Engineering Vulnerabilities?
Greed
Fear
Urgency
Lust
Sociableness
Obedience
Opportunity
Curiosity
Social Engineering & Vulnerabilities
3/3
Understanding Motive:Why do threat actors exploit these vulnerabilities?
It saves them time when brainstorming ideas
To manipulate their victims into making mistakes
Companies never train their employees on how to detect them
Tests
Complete each test to beat the game: there is no other way to escape!
Core Cybersecurity Principles
Cryptocurrency Scams
Brand Impersonation
Social Engineering & Vulnerabilities
Can We CAPTCHA Your Attention?
Final Test: Show What You Know
Can We CAPTCHA Your Attention?
1/3
Initial Intent:What is the purpose of CAPTCHA?
So websites can see how badly you really want to view their site
To make websites more tech savvy
A form of verification online that helps distinguish human users from bots
Can We CAPTCHA Your Attention?
2/3
Why it Works:Why do CAPTCHA attacks work so well?
People typically do not think twice when they are asked to prove they are not a robot.
All of the Above
They exploit "verification fatigue," knowing that since users are so used to verifying their identity, they may click too quickly and miss red flags.
The instructions given seem harmless and simple to follow
Can We CAPTCHA Your Attention?
3/3
Identifying the Signs:What is the biggest red flag to look for with CAPTCHA scams?
If a CAPTCHA asks you to identify planes instead of cars to prove you're human
CAPTCHAs that instruct you to do additional steps beyond typical identity verification tasks or ask you to copy items to your clipboard
If a CAPTCHA does not mix letters and numbers in its verification image
Tests
Complete each test to beat the game: there is no other way to escape!
Core Cybersecurity Principles
Cryptocurrency Scams
Brand Impersonation
Social Engineering & Vulnerabilities
Can We CAPTCHA Your Attention?
Final Test: Show What You Know
Final Test: Show What You Know
1/5
Core Cybersecurity Principles:What is NOT a core cybersecurity principle?
MultifactorAuthentication
Messing with the designof the real brand's logo
Think BeforeYou Click
Update YourSoftware
Practice CyberHygiene
Use StrongPasswords
Final Test: Show What You Know
2/5
Cryptocurrency Scams:Why are cryptocurrency scams becoming the preferred method for financial scams?
Because it is easier to gain money using this method
Because there are less legal protections for cryptocurrency
Because the old methods of financial scams are outdated
Final Test: Show What You Know
3/5
Brand Impersonation:What makes brand impersonation so successful?
The Mandela Effect makes it impossible to identify the true company logo
It exploits a customer's trust they have in the company
Brands are constantly rebranding so changes in branding are nothing to worry about
People are chronically online
Final Test: Show What You Know
4/5
Social Engineering & Vulnerabilities:How many key social engineering vulnerabilities are there?
11
Final Test: Show What You Know
5/5
True or False:Trustworthy CAPTCHAs won't direct you to download software or extensions.
True
False
Completed
Congratulations, you have successfully completed the escape room!
Start over?
Oh oh!
That answer is not correct...
But don't lose your balance, continue on your way and try again!
back