CC TIPS

Monthly suggestions and recommendations to help make your Crimson Circle experience smoother and easier!


CREATING A SAFE CYBERSPACE
WITH SHAUMBRA – PART 3

Do you know if you’ve got what it takes to stay safe in cyberspace? 

Continuing with our series about cybersecurity, this month (and with the help of ChatGPT) we want to test your knowledge with a quiz. Remember, it’s all in good fun, but the knowledge is real! So, put on your thinking cap, and let’s get started.

What is the first line of defense in online security?

A) A strong password 

B) A good luck charm

C) Your pet’s name

D) A Khamsa pendant

Answer A: A strong password is your first line of defense against cyber threats. Keep it unique and hard to guess!

What is the most common password in the world?

A) “123456”

B) “password”

C) “qwerty”

D) “admin”

Answer: B) “password”

Explanation: Oh, the good ol’ “password.” It’s like leaving your front door unlocked in the digital world. Easy to remember, but even easier for hackers to guess. Please choose something more secure, like “password123.” (Just kidding, don’t use that either!) By the way, none of the above are secure passwords. The best ones are complex, with a mix of upper and lower case letters, numbers, and special characters.

What is “phishing”?

A) A new type of fishing using computer mice as bait

B) A way to catch electric eels 

C) A type of online scam to steal personal information

D) A delicious seafood dish 

Answer: C) A type of online scam to steal personal information

Explanation: Phishing has nothing to do with fishing or aquatic cuisine. It’s a sneaky way cyber-criminals use emails and fake websites to “fish” for your personal information. These emails usually appear to be from a reputable source (like your bank) but are designed to trick you into revealing personal information like passwords or financial details. Don’t take the bait!

Why should you regularly update your software and devices?

 A) Because it’s fun to see new emojis

 B) To keep your tech looking cool and take better photos

 C) To fix security holes and keep hackers at bay

Answer: C) To fix security holes and keep hackers at bay

Explanation: While new emojis are cool, the real reason to update is to patch up any security gaps. Cybercriminals love to exploit outdated software, so keeping things current is your digital shield! 

You receive a text message saying your package delivery has been delayed and providing a link for more information. What should you do?

A) Click the link to track your package’s delay

B) Call the provided phone number to discuss the issue

C) Double-check the message with the courier company’s official website

D) Share the message on social media to warn your friends

Answer: C) Double-check the message with the courier company’s official website

Explanation: Phishers often use fake delivery notifications to lure you into clicking malicious links. Instead of clicking, verify the status of your delivery by going directly to the courier company’s official website.

What should you check to ensure an email is not a phishing attempt?

A) The sender’s email address (not just the name) – does it look official?

B) The length of the email – shorter emails are always safe

C) How many smiley faces and exclamation marks are used

D) The email’s font and color – is it visually appealing?

Answer: A) The sender’s email address – does it look official?

Explanation: Phishers often use fake email addresses that closely resemble real ones. Pay attention to the sender’s email address, even looking for weird or similar characters. For example, mybɑnk.comdiffers from mybank.com; the first is from hackers – check the difference in the “a.”) Legitimate organizations will typically use their official domain in their email addresses. 

What’s the best way to ensure your online safety when using public Wi-Fi at a coffee shop?

A) Order a super-hot coffee to scare away hackers

B) Always connect to the network named “TotallyNotAHackerFreeWiFi”

C) Use a Virtual Private Network (VPN)

D) Make loud animal noises to ward off cyber-predators

Answer: C) Use a Virtual Private Network (VPN)

Explanation: While ordering a hot coffee may be satisfying and loud animal noises hilarious, a VPN is your best friend for securing your internet connection in public places. Just make sure your coffee isn’t too hot to handle!

Imagine you’re setting up MFA (multi-factor authentication) for your Crimson Circle store account. Which factors might you choose to enable?

A) Your favorite color and pet’s name

B) A one-time code sent to your email

C) A secret handshake

D) A voice recording of your best karaoke performance

Answer: B) A one-time code sent to your email

Explanation: While a secret handshake or a karaoke performance could be fun, a one-time code sent to your email is a more practical MFA method for securing your account. It adds an extra layer of protection.

MFA is like having a bouncer at the entrance to your digital party – it checks everyone’s ID to make sure they’re on the guest list!

We hope this quiz gave you a chuckle and some valuable cybersecurity tips. Remember, while the quiz is all fun and games, staying safe online is no joke! Stay vigilant.

If you have any questions, please send us a note to customerservice@crimsoncircle.com 

<>
<>

10 thoughts on “CC TIPS – CREATING A SAFE CYBERSPACE WITH SHAUMBRA – PART 3”

  1. Thank you for the wake-up. And a special thank you for your super consciousness in maintaining a safe space for Shaumbra.

  2. Stephanie Jaeger

    But I think we should add super hot coffee, animal noises and a secret handshake as well.
    Just kidding.
    One of my recent projects for a client is also MFA implementation, so I know what you are going through, but I also know how important it is. Wishing you seamless integration without system failures. 😉

  3. Just learned you can also sign up for Informed Delivery wth USPS, so you know what’s coming. And they take pictures. Wow!

  4. I understand the double authentification for purchases, but please don’t complicate the log-in to simply listen to our online courses.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top