What's Your Cybersecurity IQ?
Test your knowledge on security best practices. How secure are you?
1. Which of the following would be the best password (hardest to crack)?
Your password should include numbers, upper and lower case letters, and symbols. The more complicated the combination, the more secure the password.
TRUE or FALSE: Attachments should always be treated with caution, even if you know the sender
Sometimes phishing scams include emails from names that may be familiar but will include malicious files. Always double check before opening an attachment or file you’re unsure about.
When visiting your favorite website, a pop-up appears that reads “You have won a free Apple iPod!” What should you do?
This is a common tactic used by hackers to obtain your personal information. Always make sure an offer is legitimate before submitting any information. If it seems too good to be true, it often is!
Which website URL is legitimate?
Check the address carefully and make sure it is actually the web address of the official company before you trust it.
You receive an email that says your Amazon account has been suspended pending confirmation of your personal information. The Amazon logo is in the body of the email, and the email is addressed “Dear Customer”. The sender email is Service@AmazonCustomerServiceTeam.com. What should you do?
A large company like Amazon is often the target of scammers. They will never send an email asking you to send personal information.
You receive a text message warning you that your bank account has been suspended. It says that you must click on the link in the text and update your credentials within the next 24 hours. Is this message safe or unsafe?
Your financial institution operates under strict privacy laws and would never send a text asking for updated credentials.
You receive an email from a co-worker with an attachment. The subject line reads “Please See Attached Document”. The email contains no further information. What should you do?
Again, phishing scams include emails from names that may be familiar but will include malicious files. Always double check before opening an attachment or file you’re unsure about.
TRUE or FALSE: Using only two-factor authentication is an effective tool for securing your accounts.
Two-factor or multi-factor authentication is one way to secure your account. There are many others, like secure passwords!
What is the only true guarantee against data loss due to a cyberattack such as ransomware?
Even with extensive precautions and security, there are always going to be hackers who are ahead of the game and have figured out new and creative ways to break into a network. Because of this, the safest way to protect your data is to have it backed up regularly.
Which of these is a possible cause of a data disaster?
There are many different possible causes of data loss. These are just some of them! You can never be too careful!
TRUE or FALSE: I have anti-virus protection, so when it comes to network security, I’m all set.
Anti-virus software will only protect you from known viruses. It will not protect you from new viruses and security breaches.
TRUE or FALSE: Cybersecurity is IT’s responsibility. The everyday end users in the office don’t need to worry about this topic.
End users absolutely need to do their part to protect their workstation and their personal information!
TRUE or FALSE: Software and application updates are not important and can just be ignored.
Updates should not be ignored as they often include patches for known system upgrades and security against new threats.
TRUE or FALSE: Major companies like Netflix, Google, PayPal and FedEx are often the spoofed sender of phishing messages.
Yes! Any company can fall victim to phishing scams, but we often see them pretending to be large well-known companies, even using their logo and branding.
Share your Results: