The practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
Reading time: (5 min)
The term “Cyber Security” applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories – which we will consider separately. For the sake of this article, it is important for us to understand exactly WHAT cyber security is, HOW this can happen, WHEN it will usually happen, WHY it happens, and HOW to PREVENT it from happening, either in your business or with your personal computers and networks.
The Cybersecurity Hub – South Africa’s National Computer Security Incident Response Team (CSIRT) – was established by the then Department of Telecommunications and Postal Services in 2015. This team strived to make Cyberspace, the web, an environment where all residents of South Africa can safely communicate, socialize, and transact in confidence online. CSIRT achieved this by working with stakeholders from government, private sector, civil society, and the public with a view to identifying and countering cybersecurity threats. Cybersecurity Hub continuously encourages South African citizens and organisation’s to be secure online, for any security, will only keep the honest out.
How does a Cyber-attack take place?
With people tending to spend the majority of their time online – how easy for intruders to get ahold of personal information or data. Cyber-attacks are a series of tactics that are used to change the behavior of the computer through black hat tactics. For instance, you get a phishing email in your inbox claiming that you stand a chance to win or have already won a competition you have never entered. To win or claim your prize, you would need to provide your personal information or card information. You follow the link which seems to be a lifetime deal, and voila – you’ve been hacked my friend! Intrusions can be initiated with a simple click of a link or inputting of sensitive information on unsecure or untrusted websites.
When will Cyber-attacks usually happen?
A data breach occurs when a cybercriminal successfully infiltrated a data source and extracts sensitive information. This can be done physically by accessing a computer or network to steal local files or by bypassing network security remotely. The Cyber-criminals can act fast or lay dormant for months to monitor movements on your systems before attacking.
Why Cyber Attacks happen?
- Financial benefit: Intruders hacks the computer of a business or individual and promise to restore access once a ransom is paid.
- Defrauding a company: Also, for the sake of gaining money, the criminal would send an email, looking genuine to all the customers, saying the banking details of a company changed, follow up by the criminals banking details.
- Data breaches or identity theft: Criminals gather personal information over a period and then partake in identity theft of a person/business.
- Political motives: These assaults occur for propaganda purposes in order to harm the public’s perception of a particular state or government.
How to prevent cyber-attacks from destroying your personal/professional life?
- Keep your information organized and secure.
- Ensure your software and devices are up to date.
- Freeware is not always “free”.
- Be mindful of what information you provide online.
- Be mindful of what you download, stream, and install on your devices.
- Regular Antivirus Scans on devices for peace of mind.
- Firewalls on local and wireless networks.
- Make use of multi factor authentication techniques.
- Never save passwords on devices or documents.
- Consult only secure websites.
- Have a dedicated team/company handle your cyber-security.
Don’t wait for the criminals to first enter your home before realizing you should’ve made precautions to keep them out. Be rather late than sorry! Your security is our priority (iTRINITY Consulting).
Contact us Today!