Are you Cyber Aware? Take our Security Acronym Acumen Challenge and Find Out



We've released an interactive challenge in celebration of National Cyber Security Awareness Month. Take our Security Acronym Acumen Quiz today and challenge your friends to beat your score!

October 2015 marks the National Cyber Security Alliance's 12th annual National Cyber Security Awareness Month. To promote cyber awareness we've released a fun quiz that tests your knowledge of common security acronyms.

As in many other industries, security professionals have a language all their own - a language that includes an alphabet soup of acronyms and abbreviations. Many of these are acronyms that we see and hear every day, ranging from threat types to solutions and services. It’s important to understand the information security landscape and how all of these terms fit into the market. To promote awareness of these common terms we've designed a quiz to gauge your security acronym acumen.

Test your acronym acumen today and get a badge to show off your score. Then share your badge on social media using #CyberAware in celebration of National Cyber Security Awareness Month and challenge your friends to beat your score!

Take the Security Acronym Acumen Challenge

Nate Lord

Please post your comments here

New 2017 Gartner DLP Magic Quadrant

Digital Guardian is a Leader in the 2017 Magic Quadrant for Data Loss Prevention. Read the report to understand how DLP solutions have evolved to provide advanced data protection.

Get the report now

Related Articles
More with a Whimper than a Bang: the FFIEC Issues Guidelines for Destructive Malware Risk Mitigation

The FFIEC is the latest government agency to warn industry of the potential for destructive malware attacks, issuing guidelines to banks and credit unions last month. As the potential for destructive malware attacks increases, follow these guidelines to help keep your systems and data secure.

BYOD Security: Expert Tips on Policy, Mitigating Risks, & Preventing a Breach

30 data security experts discuss the best policies on BYOD and how to prevent a breach.

Cyber Security Investments: Experts Discuss Detection vs. Prevention

Detection or prevention? 36 security pros and IT experts share their top recommendations for prioritizing security investments.