- MenúAll NewsNetworks & PlatformsProducts & PlansResponsible BusinessPublic SafetyInside VerizonFinancialHoliday 2024NoticiasNews ReleasesMedia ContactsB-roll and imagesVerizon Fact SheetRSS FeedsEmergency ResourcesCable Facts
6 questions: Can your family outsmart cybersecurity threats?
Nearly 70% of data breaches last year involved the human element, according to Verizon’s Data Breach Investigation Report. This quiz can help your family learn about ways to avoid some of the frequently encountered errors.
Full Transparency
Our editorial transparency tool uses blockchain technology to permanently log all changes made to official releases after publication. However, this post is not an official release and therefore not tracked. Visit our learn more for more information.
Spotting phishing attempts is a key focus of this year’s Cybersecurity Awareness Month. Did you know that one of the biggest cybersecurity threats you’re likely to face is human error? Whether at a big company or in the average household, human beings are often the weakest link in a cybersecurity strategy.
The findings from Verizon’s 17th annual Data Breach Investigations Report (DBIR) back this up: Nearly 70% of data breaches in 2023 were caused by a “non-malicious human element”—meaning the breach was caused by someone making a basic mistake, such as selecting a link they shouldn’t have selected or sharing sensitive information, such as a passcode, with an unverified contact. And it’s more common than you might think: The FBI’s Internet Crime Complaint Center received nearly 900,000 fraud complaints in 2023 (the latest info available), with potential losses exceeding $12 billion.
The best defense against these cybersecurity threats is education and adhering to best practices, since many cybersecurity attacks follow similar patterns. While cybersecurity training happens at many companies, it’s essential that these conversations happen at home, too.
This short quiz is a great place to start. It can help you test your knowledge of cybersecurity threats as you brush up on the basics—and it also provides a conversation starter for the whole family.
Answer: C. Scammers will often use social engineering. Social engineering is when someone tricks you by using information they found about you online. For example, the scammer checks LinkedIn to find out who your boss is and sends you an email using that name. Email addresses can also be spoofed, so check the address closely to look for errors. If something seems off, do not respond or select any attachments. Call or text your boss instead and ask if they sent the email, and you can short-circuit cybersecurity threats like this.
Answer: B. This is a common phishing scam, where the scammer wants you to call the number or select the link in the message to hand over your credit card information. The attachment or link could also install a virus on your device. Cybersecurity threats like this are usually successful because the message uses wording that makes you think you need to act fast. You’re better off checking your transactions through your bank to find out if a purchase was made.
Answer: D. Your username and password combinations could be leaked through unrelated data breaches. If you use a particular password on a specific app and that app suffers a data breach, your email address and password could be compromised and sold on the dark web. Minimize these cybersecurity threats by using a different password for every online account. (Find out how to beef up your password skills—and learn how to change the password on your MyVerizon account and device.)
Answer: A. Cybersecurity threats like this try to access one of your accounts, such as a social media account. The scammers simply submit a “forgot password” request from your account to the social network. The social network sends you a link to reset your password. Then the scammer convinces you to send them that password reset link. After they get the link, they can reset your password and lock you out. Any time you get a code or password reset link, whether it’s a verification code from Google or a link from a social media platform, never share it with someone else.
Answer: C. Some of these attackers can get pretty mean if you try to call them out on the scam. The best way to handle these cybersecurity threats is to block them on the platform. Generally, once you pay the “fee,” they take your money and block you. Always use the “goods and services” option for any online payment so you can dispute the charge if they vanish.
Answer: D. Scam messages often use urgency to get you to act. If they can get you to react before you really think about the request, it’s more likely these cybersecurity threats will be successful. Other sure signs of a scam email are mismatches in logos, such as using an old logo the company no longer uses, and grammatical errors—although with current AI tools, this has become a less reliable way to spot cybersecurity threats.
The best thing to do before you act on any message, whether it’s email, social media or text, is to stop, think and verify. Giving yourself a little time before you react could save you from becoming a victim of these cybersecurity threats. After you calm down, verify any request by checking your online account, texting your friend or sending your boss a message through your company’s internal messaging platform.
If you’re concerned that your data may have been exposed, consider this 10-step action plan related to common cybersecurity threats.
If you receive a suspicious text message claiming to be from Verizon, please forward it to SPAM (7726). You can also report it to the Federal Trade Commission.
Monitor your child’s online activity, calls and texts and block content with Smart Family.
Sarah Kimmel Werle is a digital parenting coach and family tech expert. She started Family Tech LLC to help families understand and manage the technology in their homes. She also gives quick tech tips daily on her Instagram account @FamilyTech.
The author has been compensated by Verizon for this article.