What is Cyber Security?
Cyber Security means protecting your systems, networks, and programs from digital attacks which are aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
In good old days crooks had to do it in person but in digital age you get get or may not even get a message " You have been hacked"
Common Cyber Threats:
Email Account Takeover: A cybercriminal hacks an email account and searches for emails involving correspondence between the client and their financial institutions. They learn about your habits so they can pose as you to your loved ones to steal money.
Malware, Virus, Ransom: Malicious software is created to damage/disable computers and computer systems, steal data, or gain unauthorized access to networks.
Phishing: Cybercriminals pretend to be a trustworthy source in order to acquire sensitive personal information such as usernames, passwords, social security numbers, and credit card details.
Identity Theft: Most people re-use passwords and usernames (aka ‘credentials’). Cybercriminals get hold of these logins, try them with financial institutions' websites to find matches, and then request fraudulent fund transfers.
Spoofing: Masking the source of a communication (phone or email) to look like a reputable source (e.g. government, call within a company, etc.).
Call Forwarding: The cybercriminal forwards all calls to our home and/or cell phone number to their phone.
Hacking: Someone enters your network and steal all the important information by using right credentials.
Security is everyone’s responsibility. Your Role and Responsibility is to:
- Safeguard email accounts
- Limit what youshare online
- Protect our clients’ assets
- Surf safely
- Be strategic with usernames and passwords
Here are five ways to adopt Cybersecurity in this digital age:
1. Ensure you have the physical control of your devices at all times and nobody is hacking into them
2. Use extra caution when using public Wi-Fi at the airports or stations
3. Use good email encryption client
4. Do not insert any unknown USBs in your laptops, computers
5. Report any suspicious activities to IT staff immediately
We will be happy to coach and guide you in your efforts to tackler Cybersecurity.
No comments:
Post a Comment