What is the generic term for computer programs that can wreak havoc on your devices?

IT Issues
Correct! Wrong!

Malware (or malicious software) is the term for destructive programs which can do some serious damage to your devices in all sorts of ways, or can steal your personal information.

What is spyware?

Correct! Wrong!

Spyware is the term for malicious software which collects personal information from your devices.

What is phishing?

phishing emails
Correct! Wrong!

Phishing emails typically ask you to click through to a link and sign in to a website that might seem familiar to you to steal your information. However, spear-phishing emails attempt to trick you into sending company or personal information directly through email itself, by posing as a customer, supplier or even a colleague.

Which of these is an example of a phishing email?

data breach
Correct! Wrong!

Scammers will use every trick in the book to get you to hand over personal details or open a malicious web address. Remember – if it sounds too good to be true or is meant to scare you, then think again!

When do you need to use anti-virus software?

Cyber Security MSP
Correct! Wrong!

Viruses can target all sorts of devices. Enabling protection on them can go a long way to making sure you stay secure.

Which of these indicates your connection to the web site is secure and encrypted?

Cyber Security
Correct! Wrong!

A green padlock indicates that your connection to the website is secure. This means any data you transmit to them is between you and them. You should still make sure that you trust the party on the other end before making any online purchases, if in doubt, look for reviews online or use a credit card.

Which of these is the least risky to talk about on social media?

smart phone
Correct! Wrong!

Most people nowadays spend a lot of time online and much of what they do is safe. But as we all know, it is important to take measures to protect yourself from danger – both offline and online. Make sure you keep an eye on who you are talking to (they are who they say they are) and keep track of what you're posting online.

Which of these security questions might your bank ask you over the phone?

benefits of working remotely
Correct! Wrong!

Banks will never ask for full login or banking details and it is important to use the official website or app for online banking. They may ask you to confirm your identity by providing limited details e.g. the first line and postcode of your home address but never your full password or PIN.

To protect your communications over public networks such as a cafe, you should always do the following:

working on ipad in coffee shop
Correct! Wrong!

Free public networks often use unencrypted connections, making users easy targets for hackers trying to steal personal information and posing other threats, such as infecting your system with malware.

Working at your desk, you've received an email from Microsoft explaining that your password is out of date, and you must set a new one. The link within the email will guide you through it. Your next step is?

Secure Password
Correct! Wrong!

This is a phishing email. If you are using Microsoft, a password reminder will alert your desktop, not your email address. Always use caution when dealing with emails.

You're just leaving your office for the day, when you stumble upon a USB stick on the floor. What do you do?

usb drives
Correct! Wrong!

An unidentified hard drive could cause problems. It is best to hand it in to reception so they can discover if anyone has lost it initially. This will save potential viruses and cyber threats from infecting your network. Never plug it in to your computer.

Your computer has just been infected with Ransomware and the hacker is demanding £1,000 before releasing it. What do you do?

Correct! Wrong!

The best thing to do with Ransomware is isolate your computer. Disconnecting it from the network is a great first step. Afterwards, contact the IT department to handle the issue.

Take our Cyber Security Quiz
Oh dear! Looks like you need brush up on some cyber security best practises!
There are plenty of resources out there on the web to help you brush up on best practises within cyber security. If you're a business owner, consider getting in touch with us for a cyber audit to see where improvements can be made!
Not bad!
Not bad! Above 50% so you're half way there! Subscribe to our weekly newsletter below to make sure you stay ahead of the bad apples. We publish articles to help raise security awareness in the IT industry. You're never too old to learn!
You're as safe as a tortoise under its shell!
You know what you're doing, you're probably the person your colleagues come to when they have a question or aren't sure of something. Consider subscribing to our mailing list below to make sure you stay ahead of the latest threats!
Amazing! You clearly know you're stuff! Subscribe to our mailing list to make sure you stay ahead of the latest threats!