To properly assess your risk, tell us what sort of job you have:
Please select one of the options above to proceed.
Makes great business sense. 79% of your peers in Australian Government Agencies are focusing on agility too! (1)
What is the definition of social engineering?
The Answer is D: Social engineering is the practise of exploiting human vulnerability rather than technical vulnerability. An example of this is the technique used by a cybercriminal in a phishing message to convince you to divulge your information.
Modern cybercriminals often work in purpose-built teams that even work Monday to Friday, 9am to 5pm, like you or me. Which one of the below roles within these groups is not “real”:
Please select one option above to proceed.
The Answer is C: There is no need for real-world following for attacks to be successful. Cybercriminal gangs have access to all the research tools and information they need online.
What human instinct makes us most vulnerable to being hacked?
The Answer is C: We are incredibly social creatures; our in-built need to connect and trust people leads us to constantly evaluate someone’s honesty, often on a subconscious level. Attackers are always seeking to exploit our human vulnerabilities, often linking their content to real world events to make us even more susceptible to manipulation.
With an increase in remote working, which one of the following three broad categories of attacks (against both people and organisations) is rising fastest:
The Answer is C: The many layers of control and visibility that organisations have built up to protect their data within the business are not in place to the same degree when working remotely. This is exacerbated by the large numbers of people currently working remotely.