Which Cybersecurity Animal Are You? | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware

You probably know your astrological sign; but when it comes to cybersecurity, do you know whether you’re a hawk, a lion, an ostrich, a bull, or a possum? These are the categories Keeper Security(Opens in a new window) came up with to identify password-management practices.

The security and encryption software maker surveyed over 8,000 people in the US, the UK, France, and Germany about their password habits and cybersecurity practices, and how they view cybersecurity in general.

Survey respondents labeled themselves according to five animal-themed categories. But even those who perceive themselves as strong, like hawks and lions, overlook some key safety practices. The numbers are fairly low for picking strong passwords (28% of respondents), not sharing personal information online (19%), enabling multifactor or two-factor authentication (19%), purchasing antivirus protection (11%), not considering there to be a best way to achieve personal cybersecurity (9%), using a password manager (7%), and updating software (7%).

bar graphs with data about best way to achieve cybersecurity and password practices

(Credit: Keeper Security)

Read on below to see which cybersecurity animal you are and how you can improve your cybersecurity practices.

Security Hawks

Known for: Passwords are strong and securely kept
What to work on: Overconfidence can lead to problems. Nearly 40% of those who claimed to be hawks said they didn’t know whether their passwords had been breached.
Respondents who identify as hawks: 30%

cartoon hawk

(Credit: Alfadanz/Getty Images)

Security Lions

Known for: Well-managed passwords
What to work on: Only one in three lions who say their passwords are well-managed use strong passwords for all their accounts. Try a password manager.
Respondents who identify as lions: 27%

cartoon lion

(Credit: Bullet_Chained/Getty Images)

Security Ostriches

Known for: Ignoring password-security basics, not checking to see whether information has been compromised
What to work on: Check for possible breaches on HaveIBeenPwned(Opens in a new window).
Respondents who identify as ostriches: 12%

Recommended by Our Editors

cartoon ostrich

(Credit: Alfadanz/Getty Images)

Security Bulls

Known for: Using the same simple passwords across accounts
What to work on: At the very least, put some effort into strengthening those passwords and vary them up.
Respondents who identify as bulls:10%

cartoon bull

(Credit: snegok13/Getty Images)

Security Possums

Known for: Not taking action even if they find out their passwords have been compromised
What to work on: Follow PCMag’s advice on what to do when you’ve been hacked.
Respondents who identify as possums: 5%

cartoon possum

(Credit: Nadezhda Deineka/Getty Images)

Like What You’re Reading?

Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.


Click Here For The Original Source.

National Cyber Security