Welcome to the

Quad Cyber
Security Challenge

FF Quad Cyber Challenge PDF Library_Header Banner_Image

Four days. Four activities that can help you be more resilient in the face of growing cybercrime threats.

Cybercrime and global cyberattacks can disrupt our daily lives. Take this non-tech challenge to protect yourself and your devices!

Every unsecured connected device is a potential target – both personal and corporate – but we can all be part of the solution. By educating ourselves and each other, we can grow individual awareness to strengthen our cyber defenses as a whole. To help with this, four government organisations from around the world have come together to produce the Quad Cyber Challenge.

FF Quad Cyber Challenge PDF Library_1

Challenge 1: Manage your passwords

Go through the accounts you use and make sure that your passwords are long, unique, and not easy to guess. If needed, use password managers to generate and remember different, strong passwords for each of your accounts.

Download the PDF
FF Quad Cyber Challenge PDF Library_2

Challenge 2: Activate MFA & delete unused apps

Multi-Factor Authentication (MFA) secures access to your accounts by requiring two or more forms of ID. This one step can prevent 99.9% of attacks on your accounts! Also consider deleting unused apps. Not only will it free up space on your devices – it can also protect your information.

Download the PDF
FF Quad Cyber Challenge PDF Library_3

Challenge 3: Install and automate security updates

If your device connects to the internet, then it’s a target. Hackers often rely on computer platforms that exhibit known vulnerabilities. The only way to be safe? Have the latest security updates installed. To be safe, turn on automatic updates for all devices!

Download the PDF
FF Quad Cyber Challenge PDF Library_4

Challenge 4: Watch where you click

Phishing attempts take many forms – from emails to robocalls to spam text messages. Learn how to spot potential fishing attempts before it’s too late, how to investigate a potential phishing attempt, and how to report them to the authorities.

Download the PDF