Want to create interactive content? It’s easy in Genially!

Get started free

Cybersecurity Escape Room

Sarah

Created on October 16, 2025

Start designing with a free template

Discover more than 1500 professional designs like these:

Halloween escape

Adventure Breakout

Team Building Mission Escape Game

Onboarding Escape Game

Flags Challenge

Museum Escape Room

Education Escape Room

Transcript

Cybersecurity Escape Room

Wrap up National Cybersecurity Awareness Month with this fun challenge!

start

October is NationalCybersecurity Awareness Month

Every day we are more and more connected—whether messaging family and friends, shopping online or emailing colleagues. It’s important to take steps to stay safe when using our phones, laptops and smart devices. Cybersecurity Awareness Month is a global initiative that raises awareness about online safety and empowers individuals and businesses to protect themselves from cybercrime. This year’s theme, Building a Cyber Strong America, highlights the need to strengthen the country's infrastructure against cyber threats, ensuring resilience and security. Learn more about best cybersecurity practices and the themes highlighted during our October 2025 Phishing Tournament through this interactive Escape Room!

Tests

Complete each test to beat the game: there is no other way to escape!

Core Cybersecurity Principles

Cryptocurrency Scams

Brand Impersonation

Social Engineering & Vulnerabilities

Can We CAPTCHA Your Attention?

Final Test: Show What You Know

Core Cybersecurity Principles

1/4

Multifactor Authentication:What is a common method of Multifactor Authentication?

Taking a photo of your Social Security Card

Typing in your creditcard number

Entering a code sent to asecondary account

Scanning your retnia through your device's camera

Core Cybersecurity Principles

2/4

Updating Software:Why is updating your software frequently important?

It allows your device to look modern and up-to-date

Flaws in a system can be easily exploited if not patched

Not doing so would be a violation of the device's Terms of Agreement

Core Cybersecurity Principles

3/4

Think Before You Click:What should you do if you receive a suspicious email?

Stop, Think, and Review the email for red flags - report the email if necessary

Click on the links insideto learn more

Send the email to your teamto collect their opinions

Reply to the email askingfor more information

Core Cybersecurity Principles

4/4

Use Strong Passwords:What practice should you implement when using passwords?

Not recycling the same password across your accounts

Keep all passwords on a Post-It Note for easy access

Not making the password too complex so you can remember it easily

Tests

Complete each test to beat the game: there is no other way to escape!

Core Cybersecurity Principles

Cryptocurrency Scams

Brand Impersonation

Social Engineering & Vulnerabilities

Can We CAPTCHA Your Attention?

Final Test: Show What You Know

Cryptocurrency Scams

1/3

Understanding Why:Why may scammers choose to use Cryptocurrency in their scams?

Cryptocurrency payments do not come with legal protections

Cryptocurrency payments typically are not reversible

Cryptocurrency accounts are not backed by the government.

All of the Above

Cryptocurrency Scams

2/3

Topics of Interest:Which cryptocurrency scam theme has brought in the most revenue?

Romance Scams

Investment RelatedFraud

Government Impersonators

Business Imposters

Cryptocurrency Scams

3/3

Staying Safe:How can you protect yourself against Cryptocurrency Scams?

Believe that everyone has good intent

Reply quickly so you are the only one who gets the offer

Know that if something seems too good to be true, it probably is

Cryptocurrency Scams

Want to learn more?Check out this recent story about Crypto Scams: CNN’s Kyung Lah confronts one crook who tried to steal thousands from her

Tests

Complete each test to beat the game: there is no other way to escape!

Core Cybersecurity Principles

Cryptocurrency Scams

Brand Impersonation

Social Engineering & Vulnerabilities

Can We CAPTCHA Your Attention?

Final Test: Show What You Know

Brand Impersonation

1/3

The Method Behind the Madness:How do threat actors impersonate brands?

Creating a false URL that closely resembles the site's real URL

Messing with the designof the real brand's logo

Using the same communication format as the real brand

All of the Above

Brand Impersonation

2/3

Designed to Trick:Which logo has been modified?

Brand Impersonation

3/3

Did You Know?This is the most impersonated brand, appearing in 32% of brand impersonation phishing attacks.

Microsoft

Apple

Amazon

Google

Tests

Complete each test to beat the game: there is no other way to escape!

Core Cybersecurity Principles

Cryptocurrency Scams

Brand Impersonation

Social Engineering & Vulnerabilities

Can We CAPTCHA Your Attention?

Final Test: Show What You Know

Social Engineering & Vulnerabilities

1/3

Fill in the Blanks:What is Social Engineering?

Social Engineering & Vulnerabilities

2/3

Find the Odd Man Out:Which of the following is NOT one of the key 7 Social Engineering Vulnerabilities?

Greed

Fear

Urgency

Lust

Sociableness

Obedience

Opportunity

Curiosity

Social Engineering & Vulnerabilities

3/3

Understanding Motive:Why do threat actors exploit these vulnerabilities?

It saves them time when brainstorming ideas

To manipulate their victims into making mistakes

Companies never train their employees on how to detect them

Tests

Complete each test to beat the game: there is no other way to escape!

Core Cybersecurity Principles

Cryptocurrency Scams

Brand Impersonation

Social Engineering & Vulnerabilities

Can We CAPTCHA Your Attention?

Final Test: Show What You Know

Can We CAPTCHA Your Attention?

1/3

Initial Intent:What is the purpose of CAPTCHA?

So websites can see how badly you really want to view their site

To make websites more tech savvy

A form of verification online that helps distinguish human users from bots

Can We CAPTCHA Your Attention?

2/3

Why it Works:Why do CAPTCHA attacks work so well?

People typically do not think twice when they are asked to prove they are not a robot.

All of the Above

They exploit "verification fatigue," knowing that since users are so used to verifying their identity, they may click too quickly and miss red flags.

The instructions given seem harmless and simple to follow

Can We CAPTCHA Your Attention?

3/3

Identifying the Signs:What is the biggest red flag to look for with CAPTCHA scams?

If a CAPTCHA asks you to identify planes instead of cars to prove you're human

CAPTCHAs that instruct you to do additional steps beyond typical identity verification tasks or ask you to copy items to your clipboard

If a CAPTCHA does not mix letters and numbers in its verification image

Tests

Complete each test to beat the game: there is no other way to escape!

Core Cybersecurity Principles

Cryptocurrency Scams

Brand Impersonation

Social Engineering & Vulnerabilities

Can We CAPTCHA Your Attention?

Final Test: Show What You Know

Final Test: Show What You Know

1/5

Core Cybersecurity Principles:What is NOT a core cybersecurity principle?

MultifactorAuthentication

Messing with the designof the real brand's logo

Think BeforeYou Click

Update YourSoftware

Practice CyberHygiene

Use StrongPasswords

Final Test: Show What You Know

2/5

Cryptocurrency Scams:Why are cryptocurrency scams becoming the preferred method for financial scams?

Because it is easier to gain money using this method

Because there are less legal protections for cryptocurrency

Because the old methods of financial scams are outdated

Final Test: Show What You Know

3/5

Brand Impersonation:What makes brand impersonation so successful?

The Mandela Effect makes it impossible to identify the true company logo

It exploits a customer's trust they have in the company

Brands are constantly rebranding so changes in branding are nothing to worry about

People are chronically online

Final Test: Show What You Know

4/5

Social Engineering & Vulnerabilities:How many key social engineering vulnerabilities are there?

11

Final Test: Show What You Know

5/5

True or False:Trustworthy CAPTCHAs won't direct you to download software or extensions.

True

False

Completed

Congratulations, you have successfully completed the escape room!

Start over?

Oh oh!

That answer is not correct...

But don't lose your balance, continue on your way and try again!

back