Quiz: Are you smarter than a cyber crook?


Are you aware of the latest developments in cybersecurity? Take this quiz to find out.

By Nigel Bowen

Businesses around the world are estimated to have collectively lost US$6 trillion (A$8.3 trillion) to cyber villains in 2021 alone. Much of this money was stolen from financial institutions whose staff consisted of educated, intelligent and conscientious people.

Test your knowledge to see if you’ve mastered the latest in cyber defense.

1. You have just landed a leadership or board position. When it comes to cybersecurity, what should you focus on first?

a) Understand your legal and regulatory obligations, as there is a growing trend to hold corporate executives accountable for cybersecurity breaches.
b) Familiarize yourself with the organization’s data inventory, as it will be difficult to participate in cybersecurity discussions if you are unsure of what data your organization needs to store securely.
vs) Determine what type of risk environment the organization operates in.
D) All the foregoing.

2. What type of cyber scam has become more common due to the rise of remote working?

a) Business email compromise, which typically involves cybercriminals hacking or replicating the email accounts of a CEO or CFO, then having less experienced employees transfer funds to an account controlled by the criminal .
b) E-card scams, which infect computers with malware when people click on a link claiming to be from a legitimate e-card site.
vs) Scam letters with elaborate stories that lead to requests for large cross-border money transfers.

3. What can business leaders do to address the growing threat of supply chain cyberattacks?

a) Invest in hardening state-of-the-art equipment, patch operating systems, enable multiple layers of malware protection, and perform regular testing.
b) Implement a zero-trust access model.
vs) Threatening legal action against third-party vendors if they do anything to compromise their company’s data.

4. What’s the biggest cybersecurity threat you should be worried about, but probably haven’t given much thought to?

a) Climate change is causing great white sharks to start chomping away at the undersea cables that allow data to travel around the world.
b) A long-lasting internet blackout caused by a war that could abruptly catapult the world into the pre-digital age for weeks or even months.
vs) A solar storm severely damaging the global telecommunications infrastructure.

5. If they are not tech-savvy themselves, how can a business leader ensure their IT team keeps pace with a complex and rapidly changing threat environment?

a) Have a third-party company perform regular penetration testing and provide reports highlighting system vulnerabilities.
b) Ensure that the organization’s IT team is solely responsible for managing potential cyber risks and creating a cyber-secure environment.
vs) Establish a cybersecurity director role to oversee the organization’s cybersecurity function.

6. On average, how long does it take for a company to realize that its cyber defenses have been breached, and how long does it take to contain that breach?

a) 1h97 to discover a breach and 69 seconds to contain it.
b) 19.7 days to discover a breach and 6.9 days to contain it.
vs) 197 days to discover a breach and 69 days to contain it.

7. If your company is going to outsource cybersecurity incident response to an outside company, what are the top three things that company should always provide?

a) A 24/7 customer service line, multilingual staff and centrally located offices.
b) Immersive training facilities, the ability to outsource capabilities if needed, and the ability to map breach remediation implementations.
vs) An excellent surveillance system, a well-designed application and their own data center.

8. What are the most cybersecurity-conscious companies doing to mitigate the threat posed by malicious or negligent staff?

a) Require all employees to complete online cybersecurity training.
b) Require employees to work from head office whenever possible.
vs) Conduct rigorous security checks, including digital fingerprint checks of all potential new hires, as well as regular contact with all staff to determine if life events, such as bereavement or financial hardship , have increased the risk of them acting negligently or criminally.

9. What will likely be the most significant cybersecurity challenge facing business leaders for the rest of the decade?

a) Attracting and retaining tech talent in general and cybersecurity specialists in particular, as accelerating digital transformation means that private businesses and public sector agencies around the world are in desperate need of digitally savvy workers.
b) Hackers gain access to powerful artificial intelligence (AI) tools that allow them to engage in sophisticated automated attacks.
vs) The emergence of “cloud hackers” who will find ways to hijack software running on the Internet.

10. How does blockchain technology affect cybersecurity?

a) Allow executives to form a blockchain (i.e. a peer-to-peer network), which then allows those executives to do things such as collectively verify the authenticity of data before it is stored in the company database.
b) Companies that invested in Bitcoin before its value skyrocketed can now sell it and invest the money in buying cutting-edge cybersecurity solutions.
vs) Enable most cybersecurity companies to start accepting payments in Dogecoin.

11. What cybersecurity challenges will 5G and the Internet of Things (IoT) pose to businesses?

a) Hackers will be able to take control of IoT-enabled devices – coffee machines, pacemakers and vehicles – and wreak widespread havoc.
b) This will facilitate the creation of botnets (i.e. networks of computers linked together by malicious software that criminals can control from anywhere in the world.
vs) Many devices communicating with many other devices will result in a much larger “attack surface” for hackers to target.

12. What can time-poor business leaders do to maintain “situational awareness” of emerging cybersecurity threats?

a) Find out which government agency (e.g. Australian Cyber ​​Security Centre, New Zealand National Cyber ​​Security Center and Singapore Cyber ​​Security Agency) is responsible for alerting businesses to new cyber scams and check their website regularly.
b) Subscribe to websites and publications dealing with cybersecurity.
vs) Schedule a monthly meeting with the IT team leader.

The most correct answers

Read more:
Tackling a Different Kind of Pandemic: Business Email Compromise | CybersecAsia

2. One
Read more:
Tackling a Different Kind of Pandemic: Business Email Compromise | CybersecAsia

3. One
Read more:
How CIOs Can Prepare for Supply Chain Security Challenges as 2022 Approaches | Forbes

Read more:
Australia Digital Trust Report | AustCyber

5. One
Read more:
Why Penetration Testing Matters | Vaults

Read more:
Cyberattack Stats and Trends You Need to Know in 2022 | embroiderer
Cost of a Data Breach Report 2020 | IBM

Read more:
10 hot incident response companies to watch in 2021 | Cybercrime Magazine
Digital Forensics and Incident Response (DFIR) Services Ratings and Reviews | Gartner

Read more:
Intentional or unintentional? The Impact of Insider Threats | AustCyber

9. One
Read more:
Digital professions attracting the highest salary increases | FRG
The $8.5 Trillion Talent Shortage | Korn ferry
Tech Talent Jamming | IMF

10. One
Read more:
The 5 latest cybersecurity technologies for your business | Incognito Forensic Foundation
The Future Use Cases of Blockchain for Cybersecurity | Cybersecurity Management Alliance

Read more:
What is an Intrusion Prevention System? | digital guardian
Why 5G networks are disrupting the cybersecurity industry | Forbes

12. One
Read more:
See All Reviews – Large Organizations and Infrastructure | Cyber.gov.au


About Author

Comments are closed.