Eplly is Your Ultimate Source for the Latest News, Science, Health, Fashion, Education, Family, Music and Movies.
—— 《 Eplly • Com 》
Which Cybersecurity Animal Are You?
Views: 1924
2023-06-22 22:46
You probably know your astrological sign; but when it comes to cybersecurity, do you know

You probably know your astrological sign; but when it comes to cybersecurity, do you know whether you're a hawk, a lion, an ostrich, a bull, or a possum? These are the categories Keeper Security came up with to identify password-management practices.

The security and encryption software maker surveyed over 8,000 people in the US, the UK, France, and Germany about their password habits and cybersecurity practices, and how they view cybersecurity in general.

Survey respondents labeled themselves according to five animal-themed categories. But even those who perceive themselves as strong, like hawks and lions, overlook some key safety practices. The numbers are fairly low for picking strong passwords (28% of respondents), not sharing personal information online (19%), enabling multifactor or two-factor authentication (19%), purchasing antivirus protection (11%), not considering there to be a best way to achieve personal cybersecurity (9%), using a password manager (7%), and updating software (7%).

Read on below to see which cybersecurity animal you are and how you can improve your cybersecurity practices.

Security Hawks

Known for: Passwords are strong and securely kept
What to work on: Overconfidence can lead to problems. Nearly 40% of those who claimed to be hawks said they didn't know whether their passwords had been breached.
Respondents who identify as hawks: 30%

Security Lions

Known for: Well-managed passwords
What to work on: Only one in three lions who say their passwords are well-managed use strong passwords for all their accounts. Try a password manager.
Respondents who identify as lions: 27%

Security Ostriches

Known for: Ignoring password-security basics, not checking to see whether information has been compromised
What to work on: Check for possible breaches on HaveIBeenPwned.
Respondents who identify as ostriches: 12%

Security Bulls

Known for: Using the same simple passwords across accounts
What to work on: At the very least, put some effort into strengthening those passwords and vary them up.
Respondents who identify as bulls:10%

Security Possums

Known for: Not taking action even if they find out their passwords have been compromised
What to work on: Follow PCMag's advice on what to do when you've been hacked.
Respondents who identify as possums: 5%

Tags security