Greetings Readers! These days we hear countless stories in the news about cybercrime and how this criminal activity can devastate businesses and federal agencies alike. Let’s discuss the different types of cyber security and what to do in case you become a victim. As Americans continue to become more reliant on technology, we also become more vulnerable to cyberattacks such as security breaches, spear phishing, and social media fraud.
The definition of cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.
There are various types of cybersecurity threats and with formulas to fight them. Here are a few.
Cybercrime – This is the most prominent category today. Many financial institutions spend much time and resources fighting. A large portion of cyberattacks are professional in nature, and profit motivated which is why banks are a favorite target. Cybercriminals have also figured out how to skim money off any business that handles transactions electronically. Every organization needs to prioritize protecting these high value processes from attackers.
Cyberespionage – This threat is one that organizations with trade secrets and invaluable information have to worry about the most. Pharmaceutical companies and government agencies are at most risk. The most current example of this is the compromise of proprietary material at HBO, reportedly including future episodes of Game of Thrones. All organizations need to be vigilant in triaging their most sensitive data and should implement policies guarding against data leakage of these targets.
Credential Reuse – People have so many logins and passwords to remember it’s easier to reuse credentials. Even though security best practices recommend that people use unique passwords for all applications and websites, many people continue to reuse their passwords. Attackers rely this practice when trying to hack into a website or service. When it comes to credentials, variety is essential. Password managers are available and can be helpful when it comes to managing the various logins and passwords you use.
Cyberwarfare – Cyberwarfare is any virtual conflict initiated as a politically motivated attack on the opposition’s computer and information systems. These attacks disable financial and organizational systems by stealing or altering classified data to undermine networks, websites and services. Cyberwarfare is also known as warfare or cyber war.
While the threat of cyberattacks is growing, many organizations struggle or fail to get the basic safeguards in place to protect their infrastructure and data. Here are some practical security measures that can be implemented.
- Perform regular patching of network firewalls
- Updating computer firmware
- Sett and main strong passwords
- Change the password on Wi-Fi routers
- Ask employees who use their own PC’s/laptops for work to install anti-virus software and to turn on firewalls
Top of Form
Your email address will not be published. Required fields are marked *
I have worked is various positions as a system administrator, support technician, as a help desk support, and as an IT consultant in a corporate environment. I currently run a small business where I provide computer services such as hardware configuration, installation, for residential and for medium and small businesses. You can contact me by email or visit my website at https://www.mdsystemsolutions.com.