6 questions: Can your family outsmart cybersecurity threats?

By: Sarah Kimmel Werle

Nearly 70% of data breaches last year involved the human element, according to Verizon’s Data Breach Investigation Report. This quiz can help your family learn about ways to avoid some of the frequently seen errors.

Full Transparency

Our editorial transparency tool uses blockchain technology to permanently log all changes made to official releases after publication. However, this post is not an official release and therefore not tracked. Visit our learn more for more information.

Learn more
Family Learning To Outsmart Cybersecurity Threats

One of the biggest cybersecurity threats you’re likely to face? It’s you. It might seem shocking, but whether it’s at a big company or in the average household, human beings are the weakest link in a cybersecurity strategy.

The findings from Verizon’s 17th annual Data Breach Investigations Report (DBIR) back this up: Nearly 70% of data breaches in 2023 were caused by a “non-malicious human element”—meaning the breach was caused by someone making a basic mistake like clicking a link they shouldn’t, or sharing sensitive information such as a passcode with an unverified contact. And it’s more common than you might think: The FBI’s Internet Crime Complaint Center received nearly 900,000 fraud complaints in 2023 (the latest info available), with losses exceeding $12 billion.

The best defense against these cybersecurity threats is education and following best practices, since many cybersecurity attacks follow similar patterns. While cybersecurity training happens at many companies, it’s essential that these conversations happen at home, too.

This short quiz is a great place to start. It can help you test your knowledge of cybersecurity threats as you brush up on the basics—and also provide a conversation starter for the whole family.

Question 1 About Social Engineering | Cybersecurity Threats

Answer: C. Scammers will often use social engineering. Social engineering is when someone tricks you by using information they found about you online. For example, the scammer checks LinkedIn to see who your boss is, and sends you an email using that name. Email addresses can also be spoofed, so check the address closely to look for errors. If something seems off, do not respond or click any attachments. Call or text your boss instead and ask if they sent the email, and you can short-circuit cybersecurity threats like this.

Question 2 About A Phishing Scam | Cybersecurity Threats

Answer: B. This is a common phishing scam, where the scammer wants you to call the number or click the link in the message to hand over your credit card information. The attachment or link could also install a virus on your device. Cybersecurity threats like this are usually successful because the message uses wording that makes you think you need to act fast. You’re better off checking your transactions through your bank to see if a purchase was made.

Question 3 About Data Breaches | Cybersecurity Threats

Answer: D. Your username and password combinations could be leaked through unrelated data breaches. If you use a particular password on a specific app and that app suffers a data breach, your email address and password can be compromised and sold on the dark web. Minimize these cybersecurity threats by using a different password for every online account. (Beef up your password skills even more here—and learn how to change the password on your MyVerizon account and device.)

A friend sends you a direct message on social media saying they need your help to win a contest, and that you’ll receive a code that you need to send to them. What do you do?

Question 4 About Social Media Account Hacks | Cybersecurity Threats

Answer: A. Cybersecurity threats like this try to access one of your accounts, such as a social media account. The scammers simply submit a “forgot password” request from your account to the social network. The social network sends you a link to reset your password. Then the scammer convinces you to send them that password reset link. Once they get the link, they can reset your password and lock you out. Any time you get a code or password reset link, whether it’s a verification code from Google or a link from a social media platform, never share it with someone else.

Question 5 About Fee Request Scams | Cybersecurity Threats

Answer: C. Some of these attackers can get pretty mean if you try to call them out on the scam. The best way to handle these cybersecurity threats is to block them on the platform. Generally, once you pay the “fee,” they take your money and block you. Always use the “goods and services” option for any online payment so you can dispute the charge if they vanish.

Question 6 About Urgency Request Scams | Cybersecurity Threats

Answer: D. Scam messages often use urgency to get you to act. If they can get you to react before you really think about the request, it’s more likely these cybersecurity threats will be successful. Other sure signs of a scam email are mismatches in logos, such as using an old logo the company no longer uses, and grammatical errors—although with AI tools, this is a less reliable way to spot cybersecurity threats.

The best thing to do before you act on any message, whether it’s email, social media or text, is to stop, think and verify. Giving yourself a little time before you react could save you from becoming a victim of these cybersecurity threats. Once you calm down, verify any request by checking your online account, texting your friend or sending your boss a message through your company’s internal messaging platform.

‘The Best Thing To Do Before You Act On Any Message Is To Stop, Think And Verify.’ By Sarah Kimmel Werle | Cybersecurity Threats

If you’re concerned that your data may have been exposed, consider this 10-step action plan related to common cybersecurity threats.

If you receive a suspicious text message claiming to be from Verizon, please forward it to SPAM (7726). You can also report it to the Federal Trade Commission.

Monitor your child’s online activity, calls and texts and block content with Smart Family.

About the author:

Sarah Kimmel Werle is a digital parenting coach and family tech expert. She started Family Tech LLC to help families understand and manage the technology in their homes. She also gives quick tech tips daily on her Instagram account @FamilyTech.

 

The author has been compensated by Verizon for this article.

Related Articles

Mother And Daughter Discuss Internet Safety
03/05/2024
Internet safety for teens is about stepping back and watching what they do with more freedom—and then talking about it. See our experts’ tips on how to keep teens safe, even when you relax the rules.
Mother And Kid Talking About Online Scams
02/20/2024
Kids can be vulnerable to online scams, especially on their first phone, but they can learn to spot and outsmart them. An IT specialist and parent shares her tips to help kids stay safe online.