According to a study by IBM, 95% of cyber security breaches happen because of human error. Unlike the movies, hackers can't just sneak into most computer networks and install their malicious code. In the real world, cybercriminals try to exploit human nature to trick people into turning over data or credentials right without having to write a single line of a code. The good news is that if human error is eliminated, most cyber breaches would never occur.
Take our cybersecurity quiz to find out if you have what it takes to defend your organization against the threat of a cyberattack.
You get an email that appears to be from Microsoft asking you to click a link and enter your login credentials. This could be an example of:
- Nothing to worry about
- Typical communication from Microsoft
Phishing tries to steal sensitive information such as usernames, passwords, and credit card details by impersonating a trustworthy person or company. It can be carried out via email, phone call, or even instant message. A phishing message often directs you to enter details into a fake website whose look and feel are almost identical to the legitimate one. The fake website may also infect your device with malware.
If you want to remove as many cyber risks as possible from your network, you should start:
- Throwing your hands up in despair
Hardening a system reduces security risk by eliminating potential attack vectors and making the system’s attack surface as small as possible. By removing unneeded programs, accounts, functions, applications, access, and the like, attackers have fewer opportunities to gain a foothold in your network. In short, a hardened system is a more secure system.
You just received a phone call from someone saying they’re your boss’s boss. They sound very stressed and need you to send them an account number – even though it’s not something you’d typically be asked to do. What’s going on here?
- A legitimate request from your boss
- Your coworkers playing a prank on you
- Social engineering
Answer: Social Engineering
Hackers use social engineering to manipulate people into giving up confidential information, such as a password or bank account number. Common examples of social engineering include emails that sound legitimate asking you to click a link, download a file, or enter your login credentials.
The operating system on your computer is a couple versions old and hasn’t been updated since its installation. Your OS software needs to be:
- Uninstalled and reinstalled
Patching is the process of updating software to the latest version. It’s essential for removing bugs that hackers can exploit to slip into your system.
You’re doing some work at the local library. They have free Wi-Fi, but you know it’s not wise to trust public Wi-Fi. What’s the safest, most private way to connect to the internet?
- Tor (The Onion Router)
Answer: Virtual Private Network (VPN)
VPN connects you to the internet via an encrypted tunnel. This ensures your online privacy and protects your sensitive data. A VPN is often used to create secure connections to public Wi-Fi, hide IP addresses, and keep your browsing private.
Congratulations – you made it to the end! How’d you do? If you’re feeling a little disappointed in your results, don’t worry. The experts at Elevity can keep your organization at the cutting edge of cybersecurity. If you would like to see how your company does on a real world cybersecurity test, contact us today for a free assessment or take our Cybersecurity Risk Assessment.