info(at)dizzrupt.nl

Blog Post

Edgar Versteeg • 18 March 2019

Test your online awereness

Cyber ​​criminals posing as the boss or a silent admirer in a fake email, asking you to transfer money or to open an attachment. You don't fall for that, do you? Test your awareness with the tools below and within a few minutes you how alert are.

Spoiler alert the tools - mentioned below - are only available in Dutch, so if you know sound tools in English, please let me know by dropping a comment.

It’s all about timing
Internet scammers also try to time their misleading messages as well as possible. A "request for payment of contribution" appears quite credible shortly after New Year. And who can curb curiosity when an email arrives on Valentine's Day with "my love letter to you" in the attachment? There is a good chance that opening the love letter will lead to a ransomware infection, for example.

Test your security awareness
Do you think you recognize these tricky tricks? With these tools you can quickly test how things are with your "security awareness":

1. Jigsaw Phishing Quiz
With phishing e-mails, cyber criminals’ "angle" for personal data such as passwords and codes for internet banking. Technology incubator Jigsaw (formerly Google Ideas) has developed a " Phishing Quiz" together with Google with which you can test whether you recognize phishing emails.

You see eight different e-mail messages, and the choice is yours: phishing or legitimate? The nice thing about this quiz is that the example emails are really very clever. Even after a long look, you may still fall into the trap set out for this quiz.

2. Wooki Security Awareness Test
Do you want to know which baby monitor; guitar amplifier or petty thief suits you? Or what about your knowledge of Disney, carnival and the German Oktoberfest? Wooki can test very, very much. And therefore, also the state of your security awareness.

Wooki asks you 15 questions during the Security Awareness Test. These include safe passwords, the dangers of public Wi-Fi networks and how to recognize a dangerous bank page. After answering the questions, you immediately get the result and an explanation of the answers. A playful way to find out more about topics such as encryption, ransomware and phishing.

3. Alert Online Cyberskill test
You can test almost all of your cyber skills on the Alert Online website. For example, do you know what to do to keep your passwords safe? And how do you check whether a web store is safe? And what do you do when a software update is available?

After completing the questionnaire you can see how you perform per topic based on the colors red, blue and group. In addition, Alert Online offers a checklist with recommendations per topic. The advice: "Get started and improve your online security."

Spoiler alert above mentioned tools are (only) available in Dutch, so if you know sound tools in English, please let me know by dropping a comment.

by Edgar Versteeg 12 March 2024
An growing online romance scam named as pig butchering explained
by Edgar Versteeg 12 October 2023
"Driving the Shift from an Analog to Digital business model in mobility"
by Edgar Versteeg 17 September 2021
"How to make small and medium enterprises aware of the power of cybersecurity"
by Edgar Versteeg 25 November 2020
How to trigger consumers and prosumer to rethink their relationship with energy?
by Edgar Versteeg 14 February 2024
In February 2019 I was asked to provide a keynote to the staff of DIQQ and Q-GRP about the potential of blockchain technology. Below is a short summary of my talk. What is blockchain, and what are the benefits? In my view, the power of blockchain consists of three elements. Blockchain is a new technology that enables participants in a distributed network to securely exchange data. Network security is protected by applying cryptography. A well-known definition is a shared ledger containing all network transactions, accessible to everyone. This database offers maximum transparency, unlike other databases that are often shielded. Data and network security are maintained through cryptography, making it impossible to hack a blockchain or manipulate data. Today, cybersecurity is a significant concern, and when you look at well-known hacks (e.g., Mt Gox), you'll see that hackers targeted the exchange platform or wallet but not the blockchain technology itself. Blockchain technology lacks value without an ecosystem for sharing data. Its strength lies in being open-source technology, allowing anyone to contribute to the ecosystem. Additionally, in the decentralized network, peer-to-peer exchange of 'data' or 'value' is possible, a particularly powerful feature. No central authority or middleman is required, allowing for significant efficiency gains. Moreover, crypto-economics or game theory plays a crucial role in blockchain. This involves protecting the network by considering 'rules' and 'adversarial thinking' (‘What could participants do to disrupt the network?’). Designing the ecosystem and desired and undesired behaviors among all (decentralized) participants can be encoded using incentive mechanisms (tokenization and smart contracts), which holds great potential. The interplay between a well-designed ecosystem, game theory's design patterns, and applying cryptography to concrete customer needs or use cases determine blockchain's success. Blockchain in Practice Blockchain is a powerful technology applicable in various forms, often combined with existing technology. Experimentation with various blockchain applications is underway worldwide, focusing on creating value for customers and sharing information transparently and efficiently with chain partners. A well-known example is bitcoin, which can be viewed as an alternative economic system. The bitcoin network is supported by participants, with cryptography protecting the network and facilitating value transfer. Unlike the euro, there is no central party influencing the operation of bitcoin or the ecosystem. This brings several benefits. However, the governance of a blockchain ecosystem is crucial to prevent undesirable behavior, given the atmosphere of 'get rich quick' schemes and fraud surrounding crypto. Worldwide experimentation with blockchain applications is ongoing, with the potential to significantly disrupt existing platforms like Uber, Netflix, and Facebook. Smart Contract A smart contract involves programming transactions occurring on a blockchain. A blockchain can carry value (e.g., bitcoin), which is automatically disbursed when a transaction meets certain conditions. This means processes in the financial, legal, and logistics sectors can be significantly optimized, requiring fewer human interventions to monitor network transactions. Many startups and corporates are developing blockchain applications with the potential to have a substantial impact on the increasingly digitized world. Maturity Blockchain technology is still in its infancy. After the hype in 2017 and early 2018, things have settled down. Blockchain's strength lies in its ability to carry value (e.g., a cryptocurrency) and program desired behavior in the ecosystem, such as tokenization and the application of smart contracts. Although the value of various cryptocurrencies like bitcoin has significantly declined recently, many companies continue to experiment with blockchain technology with conviction. In short, the technology is still evolving, and finding the right use cases or product-market combination remains a challenge. In my role as a product owner, this is what makes my work so challenging! The full article can be read [In Dutch] on the DIQQ website
by Edgar Versteeg 19 August 2019
In the past months, there were some interesting markers which I would like to share with you which could potentially indicate fundamental changes in the blockchain ecosystem.
by Edgar Versteeg 18 April 2019
Winner of the 2nd prize in the hackathon focused on the inclusive finance
by Edgar Versteeg 11 April 2019
Trends around blockchain that steer the automotive industry
by Edgar Versteeg 11 July 2018
Cybersecurity is an essential element to take care of building your startup or enterprise. Read my top 5 recommendations to start with today when it comes to security measures for start-ups.
by Edgar Versteeg 4 July 2018
Everyone is talking about digital transformation and the shaping of the most thrilling customer journey ever. However not everyone is sailing on a speedboat. Learn by what frontrunners do to succeed in their digital journey.
More posts
Share by: