Thank you very much for taking the time to do this survey.
This survey will not take longer than 5 minutes, and you will receive a copy at the end.
Feel free to ask your staff members to also complete the survey.
Please enter your details below to start the survey.
If the email is compromised and you reply to it,you are conversing with fraudster.It is best to confirm the validity of the message by contacting the sender somehow than using email.
Dp0si#Z$2 would be the best option.The length and complexity of passwords are key to making it harder for fraudsters to guess or crack.Common words found in the dictionary should not be used.Go ahead and challenge yourself next time - get creative!
Option #1 - should be gov
Option #2 - closely look at the domain name - the word right before the .com, .net, .org is the actual domain name.
Option #3 - look for misspelling that east to gloss over
if an offer seems too good to be true,it typically is.Don't be tempted to even look in to the offer.Close the pop-up,and do your best to try and search the page for administrative contact information to report the event. ..
If the attachment is a .doc, xls,or .pdf it is open in order to look at it.If links are embedded in the document - that may be a problem.When asked to take action (click a link or provide sensitive data),verify the source and legitimacy or request.
With broadband,always - on internet connections,it is good idea to disconnect your device when it will be idle for long period of time.At home,you should have a firewall between your PC and the internet connection.
While all of these have the potential to deliver a virus or malware onto your device,email is the most common method used by fraudsters.Mainly because it works! They can reach the masses with a single massage.
Unless you send the message encrypted,it is best to stay away from sending private information in plain text format.
Using Unlock PIN is a great idea.It will help,should the phone be lost or stolen however,it wont protect you from viruses or other malware dropped by questionable.
Put down those comic books! You have a lot to learn about the important topic of cyber security. Reach out to your IT department for training resources and someday soon you too will be a Cyber Security Super Hero!
+44 203 195 firstname.lastname@example.org://www.westtek.co.uk
Sidekick in training
Keep up your training in the world of cyber security. There are still some tricks the cyber villains are using that are getting past you. Keep a watchful eye and you'll be a Cyber Security Sidekick in no time!
Cyber Security Sidekick
Congratulations! You have almost reached Super Hero level status. Keep on the look out for villains' tricks to access your network security. Protect your customer data and your own identity by staying vigilant.
Cyber Super Hero
Congratulations, you are a powerful Cyber Super Hero. With just one degree below perfection, stay on the look-out for cyber villains posing as suppliers, vendors and customers with malicious intent. One slip-up can cost yourself or your company thousands of dollars.
Ultimate Cyber Crusader
Wow, you are the Ultimate Cyber Crusader, ready to disarm cyber criminals using your super knowledge and caution with your mouse, phone and computer. Stay alert for the ever-clever cyber villains who are looking to attack yourself and your company day and night.