October of each year witnesses Cybersecurity Awareness Month that has gone through 18 years since its advent. The month aims to improve the awareness and knowledge of all Americans while they are using the Internet. For business owners or employers, employees’ cybersecurity awareness should never be neglected or underestimated since it’s closely related to the online security of the whole organization and determines whether it’s able to smoothly run or not.
Therefore, it’s dramatically important to test employees’ cybersecurity awareness and constantly train them. The questions below will easily tell you where your employees’ cybersecurity awareness stays right now so that you’ll be able to know what to do next.
7 Common Scenarios to See Your Employees’ Cybersecurity Awareness
Cybersecurity awareness may sound so abstract while it can be easily known from actual scenarios.
Scenario 1. An employee temporarily isn’t available in front of the computer.
It’s truly wrong to leave a computer without any action. Employees’ computers should be logged out if they need to leave a little while and it’s better to set the computer to be automatically logged out to prevent data breaches.
Scenario 2. An employee should know when phishing attacks arrive.
As a normal method to be used via the Internet, phishing attacks occur whenever they can in the form of phishing emails or phishing links. Your employees should know or be alert when phishing attacks occur.
Scenario 3. What type of password do your employees use?
Passwords are a top easy method to secure accounts but it’s quite common that stupid passwords are used by employees. Sometimes, employees don’t think it significant to protect their company accounts so that the simplest passwords are usually used like their birthday, their pet’s name, etc. Worse still, some employees even use the same password everywhere and once one of the accounts gets hacked, is it possible for others to keep safe?
Scenario 4. What devices are used by employees to transfer data?
Data transmission is becoming increasingly important and necessary now in the world of connections. When it comes to employees’ cybersecurity awareness, company devices are suggested while personal devices aren’t. In addition, secure devices are suggested while insecure ones aren’t.
Scenario 5. Do your employees share passwords, even with their employers?
Your employees should never share passwords even with their employers or bosses. That’s the bottom line of cybersecurity awareness they should stick to. Once passwords are shared, the data breach pandora box will be instantly opened, which is a thing no one would like to see.
Scenario 6. Have your employees received useful cybersecurity awareness training?
It’s of great necessity to train your employees’ cybersecurity awareness at intervals. Keep in mind, do provide useful and efficient cybersecurity awareness training and say goodbye to boring and effect-free cybersecurity training. That can do nothing but increase your budget and slow down your business’s running.
Scenario 7. You have an attached file to click.
Employees that have high cybersecurity awareness should never click any attached file from unknown sources. The attached file is also a leading startup of phishing attacks.
A Detailed Question List to Test Your Employees’ Cybersecurity Awareness
The above just covers some leading scenarios when the Internet is used by employees. Here comes a detailed question list below to accurately test your employees’ cybersecurity awareness.
Q1. Choosing the strongest password from the following.
Q2. Choose the weak password from the following.
- All of the above
Q3. Choose the most suitable period to change your password from the following.
- Only when receiving alerts about the risk of account theft
Q4. Can all websites have the same type of password for security?
Q5. What is the right thing to do when a website data is leaked?
- Do nothing
- Change the password of the current network account only
- Change all account passwords that are the same as the current network account’s password
Q6. Which of the following characteristics does a strong password typically have?
- Long, simple
- Short, random
- Long, random, complicated
Q7. Which method is more secure for you to share your password with others?
- Share via email
- Share via phone call
- Share via text message
- None of the above
Q8. What should you do when backing up for security?
- A backup on an external hard drive and a backup in the cloud
- Two backups on two external hard drives
- A backup in the cloud
Q9. What is true about the padlock in the browser bar of web pages (the lock icon in front of the URL)?
- It informs me that the website is completely safe.
- The connection between my browser and the website’s server is encrypted.
- Nobody knows which websites I visit, not even my Internet Service Provider.
- It’s possible that this is a phishing site.
Q10. Can you use the public network inside KFC or McDonald’s to handle the banking business?
- Yes. It is safe
- No. It is dangerous
Q11. Can you enter your personal information (data of birth, identification number) on a website entered through the URL?
- It depends
Q12. Which statement is true about trace-less browsing or incognito mode?
- No one, not even my Internet Service Provider, has access to the websites I visited
- Others who use my device will not be able to see which websites I visited
- I’m anonymous for that website
Q13. What should you do if your business email account is compromised or leaked?
- Change your password immediately
- Notify the security team of your organization
- Both of above
Q14. Does antivirus software on Your Android Phone work?
- Yes, even if you downloaded the software from a third party
- No, unless you downloaded the software from the official
Q15. Select the option below that belongs to personal information under GDPR (multiple choice)?
- Your IP address
- Your birthdate
- Your home address
- Your first name
Q16. Can you disclose personal bank account information to a caller claiming to be a bank clerk?
- Only if I can confirm his or her identity
Q17. How should you respond to an email message that says you can receive “$7billion from Bill Gates by providing your phone number and full postal address?
- Reply with my phone number and show appreciation
- Call back and check if it is true
- Forward the email to friends and share your happiness
- Ignore it
Q18. What should you do while browsing a random website and a free Netflix window pop up?
- Follow the pop-up instructions to get the free resource
- Close the pop-up page and ignore it
Q19. What should you do about the email from ‘email@example.com’ that asks you to reset your Hyundai password?
- Change my password immediately according to the instructions given
- Ignore the content and delete the email
Q20. Whether should you lock your machine or not when leaving your desk for information security?
- Yes for sure
- No. It is too annoying
Q21. What should you do with a phone call claiming to be Microsoft technical support?
- Follow their instructions
- Provide them with your password
- Call them back
- Hang up
Q22. How do you deal with a suspicious email you’ve received?
- Open the attachments
- Click the links
- Ignore and delete the email
Q23. What should you do with a text about delays in parcel delivery?
- Click the link provided directly
- Check your own purchasing history and go to the official website to check the package logistics.
- Ignore it and delete it
Q24. Is it true that it is better to delay updating the operating system in order to save time?
- Yes, updating is always a waste of time
- No, frequent updates can enhance system security and safety
Q25. Choose the correct statement from the following.
- Types of phishing attacks range from classic email phishing schemes to more inventive approaches such as spear phishing and smishing
- Phishing is a form of social engineering
- Phishing is to steal your personal details
- All of above
Q26. As a corporate finance officer, what should you do about an email from your CEO asking you to transfer millions to a designated account?
- Call or meet in person with your CEO to reconfirm this transfer order, including the account and amount.
- Execute the transaction directly and then reply to your CEO by email.
Q27. Should you participate in the campaign by seeing the free gift drawing page?
- Yes. I’m lucky. It’s a free gift.
- No. It might be a trick. I won’t click that.
Q28. Which one is true about phishing email?
- This email appeared out of the blue
- There is no context and no previous contact with the sender
- A free gift or service
- All of the above
Q29. What should you do with an SMS from the seller that asks you to click on a link to renew the contract?
- Click the link or download the file without worrying
- Check with your seller through another channel
Q30. Which month is Cyber Security Month?
Q31. What are people who carry out social engineering attacks called?
- An Information Engineer
- A Social Engineer
- A Social Media Activist
Q32. What should you do with a working USB device you find in the hallway?
- Check what’s on the USB device and try to identify its owner.
- Leave it in the hallway or take it to the reception desk.
- Pick it up and hand it to your IT department because it could be a USB device containing malware that can infect your company’s systems.
Q33. Which of the following is Google’s URL?
- All of above
Q34. Select the URL below that cannot resolve the Typosquatting Attack.
- All of the above
Q35. Whether or not you should believe the content of an email that says it came from a trusted sender?
- No. See if the content of the email involves money transfers, personal privacy, etc. If so, reconfirm with the sender by other means.
- Yes. People I trust won’t lie to me.
Q36. What attitude should you take when receiving an email offering to participate in a quiz and get a free cup?
- I happen to need a cup. I’ll try it then
- This is a bad idea. It might be a scam to steal my personal information
Q37. Which of the following helps to judge the credibility of an online shopping platform?
- The site’s address starts with ‘HTTPS://’
- Do some research to see if the site has a good reputation
- Read and look for positive reviews from other customers on the site
Q38. Which of the following is best used when shopping online?
- A credit card
- A debit card
Q39. Which of the following will happen if you do not use a PIN on your phone?
- When my phone is not with me, all my information and applications can be accessed by finders.
- When my phone is unattended, miscreants can access all my online accounts through my email address.
- When my phone is stolen, thieves can access all of my information and applications.
- All of the above.
Q40. Is it advisable to pay criminals to run ransomware to encrypt files on computers? How about the reason?
- Yes, because you know you’ll be able to access your data again.
- Yes, because you don’t have to be concerned about backups.
- No, because there is no guarantee that you will be able to access your data again.
- No, since criminals may attack you again later if they are still active on your network after you have your files back.
Your employees may not have as much cybersecurity awareness as you think. Regularly promoting cybersecurity-related knowledge can improve the security of your company’s network. Cybersecurity Month is a perfect time of year to do this.
- What is My IP Address and How to Hide It with One Tap on a VPN?
- What is Ransomware? Everything You Should Know About Top 1 Possible Cyberattack in 2021
- What’s Computer Hacking and How to Prevent It
- Ask Your Employees These Questions to Easily Test Their Cybersecurity Awareness
- Why Your VPN is So “Slow”