QUIZ: You’re Cyber Savvy—But Are You Safe? 

When it comes to all things digital, we might be savvy, but are we safe? Test yourself with this short quiz and learn how to improve your cyber hygiene.

Despite our growing reliance on technology, many people are still shocked when they fall for cybercrime scams or encounter security breaches. How much do you know about cybersecurity? Take the quiz below to see if you’re as updated about your cyber hygiene as you might think. To get expert recommendation, we reached out to our tenants in the cybersecurity industry—Wee Ken-Jin, the Cybersecurity Head at Evvo Labs, and Matthias Chin, CEO of Cloudsine at The Curie—who shared their tips on how you can keep up your cyber health.

Q1. What are cookies? 

a. Camera and microphone access

b. Malware that reads your information

c. Data stored on your computer by the web browser

d. Software that keeps track of your browser history 

 

ANSWER: (c) 

While not edible, internet cookies (also called HTTP cookies or magic cookies) refer to a string of text saved on your computer, which contains information like your log-in information and website activity. Most websites now allow you to choose your cookies settings! Google Chrome also recently announced that they’re planning to block all cookies by default by 2022. 

 

Q2. What's the secret to creating a good password? 

a. Adding uppercase, numerical, and special characters

b. Creating long passwords

c. Avoid reusing passwords 

d. Enabling two-factor authentication 

e. All of the above

 

ANSWER: (e)

A good password can be tricky to create. According to Matthias, commonly used passwords are cracked more easily than unique and complex ones, so avoid using simple passwords. He also recommends using 2FA whenever possible, and use a password manager to generate a strong password for each login. For increased protection, change your passwords on a regular basis. Matthias suggests deleting or clearing unused accounts entirely to reduce your digital footprint. 

Q3. Which one of the following tips will not help you protect your phone against spyware

a. Always connect to public WiFi

b. Use face recognition or biometrics to unlock your devices 

c. Update your phone to the latest software available 

d. Back up information on your phone regularly 

 

ANSWER: (a)

According to Ken-Jin, public WiFi is an easy way for hackers to intercept or drop malicious spyware into your phone.You should be most wary of connecting to WiFi hotspots at airports, since they're the easiest for cyber attackers to intercept.

 

Q4. What counts as phishing? 

a. When a criminal tries to obtain information by presenting themselves as a trusted source

b. When your data gets corrupted

c. A criminal hacking into your wireless network 

d. A type of computer virus 

 

ANSWER: (a)

Phishing is a cyber attack that appears to come from a trusted source—a request from a bank, a note from a colleague or a message from your acquaintance—containing a link that infects your computer with malware, or gets access into your emails or bank account. 

Q5. Which of the following might be an example of a phishing scam?

a. Close friends or acquaintances calling you suddenly for financial help

b. Acquaintances claiming they accidentally sent their verification code to your phone number

c. An email by a public account telling you your personal information has been compromised and needs to be checked

d. A greeting card sent by an acquaintance with a link to view it

e. All of the above

 

ANSWER: (e)

All of these could be different forms of phishing scams. If in doubt, you should first ask to verify the authenticity over a phone call, since scammers will most likely decline a call. However, advancements in AI have led to a rise in voice cloning scams. Matthias recommends being vigilant: avoid opening any suspicious email attachment, and have malware protection at all times. 

 

Q6. How should you protect your mobile device from being hijacked by phishing scammers?   

a. Installing ad blockers 

b. Email filters to identify any suspicious emails

c. Securing your voicemail with a code

d. Set up 2FA for all your devices

e. All of the above 

 

ANSWER: (e) 

While all of these methods can help secure your phone, an important step that some overlook is securing your voicemail with a PIN code. One of the latest scams on the rise is voicemail hacking, where scammers gain access to your WhatsApp or Telegram account through your voicemail and impersonate you. Matthias believes it’s always good to be vigilant and spot any abnormal behaviour or patterns to avoid being hacked.

Q7. What’s the difference between http:// and https://?  

a. The type of platform the website is hosted on 

b. The loading speed of the website

c. The type of service provider 

d. The type of encryption  

 

ANSWER: (d) 

HTTP, referring to ‘hypertext transfer protocol’, allows web data to be presented to your screen. The S in HTTPS stands for secure, as it comes with standard security technology that establishes an encrypted connection. Make sure to input personal details only on HTTPS website, since they are more secure! 

 

Q8. Which of these is not a purpose of encryption on messaging platforms? 

a. Authenticate the message’s origin

b. Scan the message for spam or malware

c. Ensure message content has not been tampered with 

d. Provide data confidentiality of messages being exchanged  

 

ANSWER: (b) 

While encryption services on platforms like WhatsApp and Telegram ensure that messages are exchanged safely between you and the person you’re speaking to, it does not identify potentially suspicious messages. You’ll have to rely on your cyber-savvy skills and keep up with the latest updates on how to identify scams.  

Q9. Should I sign in to websites with Facebook/Google/Apple? 

a. Yes

b. No

c. I’m not sure 


ANSWER: (a)… and (b) 

While logging in with Facebook and Google allows you to keep track of less log-in information, this method can be risky if you if you do not update your passwords often. Matthias recommends updating your passwords regularly, and in some cases to use throwaway or separate emails to protect your personal information. 

 

Q10. What’s the best software you should have on your computer? 

a. Antivirus software

b. Anti-spyware software

c. Firewall software

d. All of the above

 

ANSWER: (d)

Ken-Jin believes that equipping yourself with good cybersecurity software is a good investment in the long run: not only does it protect your personal information, but a small investment can also save you from bigger cyber crime issues that could lead to financial loss. As the saying goes, prevention is better than cure! 

How did you fare on this quiz? While our cybersecurity experts believe that removing your digital footprint is near-impossible, Ken-Jin believes that mindset is also important: according to him, those who believe that they will not be a cybercrime victim are the most at risk, since they're more likely to let their guard down. 


Subscribe to our e-newsletter your Workplace Community to receive content around

  • Hacks and ideas to enrich your work-life experience and well-being
  • Community stories and features
  • Upcoming events and promotions for the CapitaLand Workspace community and more!

 

You might also like...