By JB Peterson Posted January 18, 2018 In 0 0 Welcome to your Business Cybersecurity Quiz Email Name Company 1) In your office, which of these devices have installed and up-to-date cybersecurity protection software? Office Computers (workstations & laptops) Servers Mobile Devices 2) Does your endpoint cybersecurity software include behavior based detection to protect against ransomware? Yes No What's behavior based detection? 3) Research shows that employees, whether knowingly or unknowingly, are the #1 security threat to a business. Do you provide social engineering or cybersecurity awareness training for your employees? Yes No 4) Select the option that best summarizes the characteristics of ransomware. Important computer files are encrypted. A ransom is requested to decrypt files. Once the ransom is paid files are decrypted. 1,2 and 3 are characteristics Only 1 & 2 are characteristics. 5) If your office becomes subject to a ransomware attack, what would you most likely do? If asked to pay a ransom to decrypt our files, we would. We regularly backup files and would restore an infected computer from a backup. We do not backup files but would refuse to pay a ransom, losing our data. 6) Which methods do you use to backup files on each of your office computers? (select all that apply) Local file backup (USB drive or local file server). Cloud file backup. We do not backup files. 7) When it comes to password security... (select all that apply) I use the same password for most of my logins. I utilize a password manager to help create unique, complex passwords to ensure my passwords are secure. One or more of my passwords include some form of personally identifiable information. My passwords are more than 8 characters. My passwords include all of the following: numbers, uppercase letters, lowercase letters and symbols. 8) You get an email from someone you know. The subject says, "Thought you might like this..." The email contains an attachment titled jryff2vz.exe. What do you do? Open the file because it's from someone I know. Call the person and ask if they sent you an email with an attachment before you open it. Time's up Recent PostsSecurityCoverage & NeoNova: Better TogetherNeoNova Acquires Leading Support and Technology Provider SecurityCoverageWorld Backup Day is March 31st!Ryuk Brings in Big Money in 2018