Test Your Online Security Quiz

All of our content is written by humans, not robots. Learn More
By
&
Aliza Vigderman
Gabe TurnerChief Editor
Last Updated Nov 3, 2022
By Aliza Vigderman & Gabe Turner on Nov 3, 2022

Phishing. Hacking. Jacking. There’s a lot of talk flying around about cybersecurity, but how do you know if you’re staying safe online? Enter our Online Security Test. By asking only a few simple questions, we can figure out where you fall short when it comes to cybersecurity. Of course, if you do have something to learn, we can help with that as well. Let’s get started!

Test Your Online Security

Cybersecurity Tips

Along with our security quiz, we offer a few easy tips to improve your online security.

Two-Factor and Multi-Factor Authentication

protect-iphone-from-hackers
Two-Factor Authentication

The easiest way to increase your cybersecurity is to turn on two-factor authentication, or, for additional security, multi-factor authentication. Although it may seem tedious,

  • Receiving a push notification on your smartphone or
  • Using biometrics like your fingerprint

is a great way to ensure that you are who you say you are.

Password Manager

master-password-manager
Master Password

We also recommend using a password manager which would create difficult and unique passwords for all of your websites and accounts. Don’t worry, though— you won’t have to remember all these passwords, just the password to your password vault, otherwise known as a master password. Depending on the password manager, you’ll be able to:

  • Sign in to all of your accounts with just one click
  • Sync your passwords across multiple devices

VPNs vs. Incognito Mode

How VPNs Work

For a user that wants even more security, we recommend using a VPN, or virtual private network. VPNs are useful if you:

  • Have particularly sensitive data or
  • Want to use a server from a different country.

Rather than being directly connected to the Internet, all of your data will travel through encrypted tunnels to private servers. Wondering which VPN is for you? Pick out the best VPN for your needs, or start by reading our VPN guide.

Incognito Mode

Another, more simple option would be going in private or incognito mode. Keep in mind that incognito mode will only hide your internet activity from someone using your device, but it doesn’t protect your activity from outside of the device. Companies, employers, and governments will still be able to track you via your internet service provider, the websites you visit, and your network.

Social Media

Social media may seem ubiquitous today, but have you ever really stopped and thought about what data you’re putting out to the world? Many people faced a rude awakening when social media app Timehop had a data breach that affected about 21 million app users.1 Sensitive information like names, emails, and phone numbers was released, although private messages, photos, and Timehop data remained secure.

If you have any privacy concerns, start by making all of your social media accounts private. You may just think that you’re just posting fun pictures, but information like your:

  • Location
  • Education
  • Email
  • Employment

may be exposed to the world. It’s important to practice caution whenever posting on social media, especially if your profile is public.

Organizational Cybersecurity

prevent-iphone-hacking
Phishing

For an organization, we recommend having a few people handle one account, rather than a single person through a personal account. If only one person handles an account and it’s hacked, there will be no way for other people to step in. Jumping off of that, if an employee quits or is terminated, their social media access should be revoked as soon as possible. Otherwise, you risk having the former employee post something that could potentially damage your brand.

Aside from employees that have recently been let go, keep in mind that naive employees may be your biggest cybersecurity threat. In fact, over 90 percent of cyber-attacks are attributed to human error.2 Hackers’ strategies include:

  • Phishing
  • Ransomware
  • Pharming

so it’s important to educate employees on potential threats.

Software Updates

iOS Software Updates on iPhone

Now let’s talk about your computer. Every computer should have:

  • Antivirus software
  • Anti-spyware software
  • Firewall software

downloaded. Concurrently, users should update all app and operating system software right away, as this might contain further security updates. As viruses are constantly being tinkered with, frequent updates are a must.

Cloud Storage

Cloud Storage vs. Local Storage
Cloud Storage vs. Local Storage

If you have cloud storage, consider that you’re at an increased risk of being hacked. According to Symantec, over 75 percent of cloud websites contain vulnerabilities, nine percent of which are critical.3 We recommend:

  • Backing up your data to local storage like a hard drive
  • Closely monitoring the data you’re storing in the cloud.

Online Banking Security

Finally, we provide tips about financial security, and no, we don’t mean how much money you have. When it comes to online banking, users should

  • Consistently check their bank transactions to make sure every expense is accounted for
  • Make sure that a padlock symbol is visible before making any online purchases
  • If your browser is telling you that a website is insecure, it’s probably a good idea to not complete your purchase, no matter how cute that dress might look on you.

We hope this quiz and tips will help you stay safe online! While digital security may feel like an overwhelming topic, in a few minutes, you can greatly bolster your resistance to cyber attacks.

Citations
  1. CSO. (2018). How did the TimeHop data breach happen?
    csoonline.com/article/3296486/how-did-the-timehop-data-breach-happen.html

  2. Cyber Security Intelligence. (2020). 90% Of Breaches Are Caused By Human Error.
    cybersecurityintelligence.com/blog/90-of-breaches-are-caused-by-human-error-4820.html

  3. Broadcom. (2016). Internet Security Threat Report.
    docs.broadcom.com/doc/istr-21-2016-en