top of page
  • projects9372

Is Your Organization Dropping the Cybersecurity Ball?

According to a study by IBM, 95% of cyber security breaches happen because of human error. Hackers can't just sneak into most computer networks and install their malicious code. Cybercriminals try to exploit human nature to trick people into turning over data or credentials without having to write a single line of a code. The good news is that if human error is eliminated, most cyber breaches would never occur.

Take our cybersecurity quiz to find out if your organization is properly defended against the threat of a cyberattack.


You get an email that appears to be from Microsoft asking you to click a link and enter your login credentials. This could be an example of:

  1. Nothing to worry about

  2. Phishing

  3. Typical communication from Microsoft

Answer: Phishing

Phishing tries to steal sensitive information such as usernames, passwords, and credit card details by impersonating a trustworthy person or company. It can be carried out via email, phone call, or even instant message. A phishing message often directs you to enter details into a fake website whose look and feel are almost identical to the legitimate one. The fake website may also infect your device with malware.


If you want to remove as many cyber risks as possible from your network, you should start:

  1. Hardening

  2. Patching

  3. Throwing your hands up in despair

Answer: Hardening

Hardening a system reduces security risk by eliminating potential attack vectors and making the system’s attack surface as small as possible. By removing unneeded programs, accounts, functions, applications, access, and the like, attackers have fewer opportunities to gain a foothold in your network. In short, a hardened system is a more secure system.


You just received a phone call from someone saying they’re your boss’s boss. They sound very stressed and need you to send them an account number – even though it’s not something you’d typically be asked to do. What’s going on here?

  1. A legitimate request from your boss

  2. Your coworkers playing a prank on you

  3. Social engineering

Answer: Social Engineering

Hackers use social engineering to manipulate people into giving up confidential information, such as a password or bank account number. Common examples of social engineering include emails that sound legitimate asking you to click a link, download a file, or enter your login credentials.


The operating system on your computer is a couple versions old and hasn’t been updated since its installation. Your OS software needs to be:

  1. Uninstalled and reinstalled

  2. Patched

  3. Ignored

Answer: Patched

Patching is the process of updating software to the latest version. It’s essential for removing bugs that hackers can exploit to slip into your system.


You’re doing some work at the local library. They have free Wi-Fi, but you know it’s not wise to trust public Wi-Fi. What’s the safest, most private way to connect to the internet?

  1. VPN

  2. Proxy

  3. Tor (The Onion Router)

Answer: Virtual Private Network (VPN)

VPN connects you to the internet via an encrypted tunnel. This ensures your online privacy and protects your sensitive data. A VPN is often used to create secure connections to public Wi-Fi, hide IP addresses, and keep your browsing private.

Congratulations – you made it to the end! How’d you do? If you’re feeling a little disappointed in your results, don’t worry. The experts at Convergence BizToCloud can ensure your organization has the cutting edge of cybersecurity. If you would like to see how your company does on a real world cybersecurity test, contact us today for a free assessment.

16 views0 comments

Recent Posts

See All
Post: Blog2_Post
bottom of page