-
.
- Ελληνικά
The huge importance of Cybersecurity - Simple and useful tips
[/P]Why is cybersecurity important?
Cybersecurity is the art of protecting networks, devices and data from unlawful access or criminal use and the practice of ensuring the confidentiality, integrity and availability of information. Communication, transportation, shopping and health are just a few of the things we now do Online. Much of your personal information is stored either on your computer, smartphone, tablet or possibly on a third party's system. Knowing how to protect the information you have stored is very important, not only on a personal level but also for an organization and its employees.
- In 2021, statistics showed that every 11 seconds, there is a ransomware attack compared to 39 seconds in 2019.
- 43% of cyber attacks targeted small and medium sized businesses and have increased these attacks by 400% since the start of the pandemic.
- Companies and organizations, as well as many foreign governments, have been affected by the theft of intellectual property, trade secrets and other highly valuable information by Advanced Persistent Threat (APT) groups. By establishing initial access, APT exploits user and administrator credentials (passwords), allows movement within the network to other systems, and identifies high-value information for data extraction. To mitigate the risk, network protection procedures that comply with best practices should be implemented. These guidelines can make it easier to manage the risk and mitigate the threat presented.
- By stealing compromised passwords, an attacker can obtain personal data of the victim.
- Malicious users create new email accounts and use contacts to trigger social engineering attacks (i.e. impersonate an acquaintance of the victim).
- Phishing emails containing malware and malicious attachments are sent.
- Malware is used to exploit several common vulnerabilities by exploiting software vulnerabilities.
- Use antivirus software against viruses and other malware. Antivirus software is very important against malicious cyber users and malicious threats. It can automatically detect, quarantine and remove several types of malware. Automatic virus updates should always be enabled to ensure maximum protection against the latest threats.
- Keep software updated. It is known that attackers exploit exactly these known problems and vulnerabilities. Ensuring that software updates are installed and using automatic updates for your operating system will help protect you from attackers.
- Use a firewall. Firewalls can prevent certain attacks by limiting malicious traffic before it enters the network. It also limits unnecessary outbound communications. Some devices and operating systems have a pre-installed firewall. However, make sure that your device is currently using a firewall and that it is configured correctly.
- Use strong passwords. Creating passwords that will be difficult for malicious cyber users to guess is crucial. Use different passwords for different programs, devices and Internet accounts. It is also best to use long, strong passphrases or passwords consisting of at least 15 to 16 characters. Use password managers to create and remember passwords for each of your accounts.
- Double the protection of your connection. Enable Multi-Factor Authentication (MFA) to ensure that the only person accessing your account is you. Use it for email, banking, social media and any other service that requires a login. If MFA is an option, enable it using a trusted mobile device such as your smartphone, an authentication app or a secure token-a small physical device that can be hooked to your keychain.
- Beware of phishing. The goal is to obtain information about you and use your information to make unauthorized purchases or gain access to a secure system.
Be suspicious of unexpected emails and always check the sources of the email address to make sure the email is not coming from a fake website.
(MB/IK)
Contents of this article including associated images are owned by PIO
Views & opinions expressed are those of the author and/or PIO
Source