How Cyber Savvy Are You? Take Our Cybersecurity Quiz and Find Out

Westmire Wired (1)

October is Cyber Security Awareness Month. At SolidTrust Pay, we want to help you, our valued members and merchants, be more secure online by staying informed and knowing the simple steps you can take right now to protect yourself, your families, your workplaces and the devices you rely on every day.

It’s believed that by the year 2021, cybercrime will cost $6 trillion annually, making it more profitable than the global trade of illicit drugs. In 2018, nearly a quarter of Americans (23%) reported that they or someone in their household fell victim to a cybercrime attack. The figures are almost identical in Europe, with major studies in the UK, France and Spain revealing that just over 25% of respondents have been a victim of computer crime. Today, you are 20 times more likely to have money stolen from you by a criminal living in another country through the internet than by being robbed in the street.

You may think that cybersecurity is a challenge to be solved by the government, financial institutions and corporations, but the truth is that cybersecurity is a shared responsibility and there are many simple steps that you can take to protect yourself. If you would like to learn which 10 Internet Safety Rules You Should Never Break, please click the link.

To test your cybersecurity knowledge, we have adapted a short 10 question quiz from the Pew Research Center. If you score above 6 correct responses, congratulations, you’re well on your way to being a savvy online user. Scores below 6 indicate that you could benefit from improving your cybersecurity knowledge. Answers to the quiz can be found at the bottom of this post.

Cybersecurity Quiz

Question 1

What does the “https:” at the beginning of a URL denote, as opposed to “http:” (without the “s”)?

  1. That the site has special high definition
  2. That information entered into the site is encrypted
  3. That the site is the newest version available
  4. That the site is not accessible to certain computers
  5. None of the above

Question 2

Which of the following is an example of a “phishing” attack?

  1. Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows
  2. Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information
  3. Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest
  4. All of the above
  5. None of the above

Question 3

A group of computers that is networked together and used by hackers to steal information is called a:

  1. Botnet
  2. Rootkit
  3. DDoS
  4. Operating system
  5. None of the above

Question 4

Which of the following four passwords is the most secure?

  1. Boat123
  2. WTh!5Z
  3. into*48
  4. 123456
  5. None of the above

Question 5

Criminals access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called:

  1. Botnet
  2. Ransomware
  3. Driving
  4. Spam
  5. None of the above

Question 6

“Private browsing” is a feature in many internet browsers that lets users access web pages without any information (like browsing history) being stored by the browser. Can internet service providers see the online activities of their subscribers when those subscribers are using private browsing?

  1. Yes
  2. No

Question 7

Turning off the GPS function of your smartphone prevents any tracking of your phone’s location.

  1. True
  2. False

Question 8

If a public Wi-Fi network (such as in an airport or café) requires a password to access, is it generally safe to use that network for sensitive activities such as online banking?

  1. Yes, it is safe
  2. No, it is not safe

Question 9

What kind of cybersecurity risks can be minimized by using a Virtual Private Network (VPN)?

  1. Use of insecure Wi-Fi networks
  2. Key-logging
  3. De-anonymization by network operators
  4. Phishing attacks
  5. All of the above

Question 10

When browsing online, a new window pops up stating that a virus has been found on your computer. The window provides a button to click offering to resolve the issue. Your best course of action is to:

  1. Click on the button to remove the virus
  2. Place your cursor over the button and check the link’s website address (URL). If the address looks legitimate, click on it. If it looks like a scam link, close the window
  3. Close the original browser window and the new “pop-up” window. Do not return to the site
  4. Hit the back button and see if it goes away
  5. None of the above

 

We Will Never Compromise Your Security

At SolidTrust Pay, protecting your privacy is our top priority. Our corporate-grade anti-virus and firewall protection is continuously monitored by our network of global security personnel. We are PCI compliant and use 256-bit SSL certificates to keep your data safe and secure. Unlike other e-wallet providers and payment processors, we have instituted a dual password system to better safeguard your personal and financial information. We require that all passwords be routinely updated and they must adhere to strict parameters. In addition, all SolidTrust Pay transactions require a secondary password, a TrustCard code or a Two-Factor Authentication (2FA) text message as an added security measure.

By requiring a secondary password for all payments and transfers sent from your e-wallet, we adopted Two-Factor Authentication (2FA) security protocols before they became best practice. We are continually striving to remain one step ahead of cybercriminals and cyberthreats, a mandate that guides our Corporate Philosophy. When you choose SolidTrust Pay for your payment processing needs, you’re getting more than a convenient and secure e-wallet – you’ll enjoy complete peace of mind knowing that your personal and financial information is securely stored, encrypted and only accessible by you.

SolidTrust Pay Logo

If you enjoyed this post, please subscribe to our Blog and follow us on Facebook and Twitter.

Quiz Answers:

Question 1 = 2 (That information entered into the site is encrypted)
Question 2 = 4 (All of the above)
Question 3 = 1 (Botnet)
Question 4 = 2 (WTh!5Z)
Question 5 = 2 (Ransomware)
Question 6 = 1 (Yes)
Question 7 = 2 (False)
Question 8 = 3 (No, it is not safe)
Question 9 = 1 (Use of insecure Wi-Fi networks)
Question 10 = 3 (Close the original browser window and the “pop-up” window. Do not return to the site)

Customer Support Centre Update

January 10th, 2019

To all our valued members, our site update is almost complete. Please be advised that Live Chat remains temporarily unavailable. If you require account assistance, you may submit a support ticket, but please be aware that we will be replying to all customer service requests through email. We thank you for your patience and apologize for the inconvenience.

 

Current Logo

For news and updates, visit our official Facebook and Twitter page. You may also visit our Help Centre for answers to common questions.

 

untitled design


Equifax Data Breach and SolidTrust Pay

Credit-monitoring company Equifax Inc. suffered a security breach that could affect up to 143 million people in the United States, as well as expose the “limited personal information” of an undisclosed number of Canadian and British Equifax users.

Equifax did not indicate the number of Canadians/British that could be affected or how, and Equifax Canada spokesperson Tom Carroll said the company is not providing any further information on the impact of the hack in Canada.

Based in Atlanta, Equifax is one of three major credit bureaus in the United States. Between May and July of this year, the company stated that cyber-attackers exploited a U.S. website application to access files which contained the personal information sought by the hackers.

“On a scale of 1 to 10, this is a 10 in terms of potential identity theft,” said Gartner security analyst Avivah Litan. “Credit bureaus keep so much data about us that affects almost everything we do.”

Names, addresses, birthdates, social security numbers and drivers license numbers were all among the information obtained. Equifax said its core credit-reporting databases don’t appear to have been breached.

“This is clearly a disappointing event for our company, and one that strikes at the heart of who we are and what we do,” Equifax CEO Richard Smith said in a statement. “I apologize to consumers and our business customers for the concern and frustration this causes.”

For more information, and to find out if you have been personally affected, you can use the website www.equifaxsecurity2017.com, which has been set up by Equifax. The website allows users to verify if their information was potentially affected, and helps them sign up for the free credit-file monitoring and identify-theft protection offered by Equifax in light of the breach.

NOTE: Some people are furious about the site’s functionality, and it includes an arbitration clause, which means that people who use the site waive their rights to a class-action lawsuit.

While SolidTrust Pay was not affected by the attack, events such as these serve as a reminder to always employ best security practices. We suggest that users update passwords and use a password manager, delete old accounts with personal information if you are no longer using them, and follow our 10 steps for better internet safety!


#NotPetya Hackers Demand $250,000 for Ransomware Decryption Key

The hackers responsible for last week’s globe-spanning ransomware attack have made a public statement for the first time since the attack.

The group responsible for #NotPetya have allegedly surfaced on the deep web with a statement offering the decryption key to all files encrypted by the ransomware they unleashed from Ukraine last week.

The post was first picked up by Motherboard after the group used the Bitcoin wallet associated with the ransomware to make a small donation to the Tor-only announcement service DeepPaste, which is where the message appeared.

The message makes a request for 100 bitcoins, which is over $250,000 in today’s market.

NotPetya hacker demands for 250000 on deeppasteAccording to The Verge, “the message includes a file signed with Petya’s private key, which is strong evidence that the message came from the group responsible for Petya. More specifically, it proves that whoever left the message has the necessary private key to decrypt individual files infected by the virus.”

There was also a link to a chatroom included in the messages. During an interview conducted in the chatroom, someone claiming to be one of the malware authors told Motherboard that the price was so high because it’s for the key “to decrypt all computers.”

Motherboard offered the unknown group an individual file that had been decrypted by the malware and asked them to send it back decrypted as proof that they had the decryption key. The unknown individuals in the chatroom were unable or unwilling to decrypt the file.

Some are still convinced that this attack has nothing to do with money or ransomware.

“This is a fear, uncertainty and doubt case,” claimed the founder of Comae Technologies Matt Suiche in an online chat with Motherboard. “This is a clear attempt from the attackers to try to further confuse the audience by changing the wiper narrative into a ransomware one again.”

cyber security internet safety privacy software malware network access apps secure logs