Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

INFORMATION ABOUT CYBER SECURITY

Part 1

What is Cybersecurity?

Cybersecurity refers to the body of technologies, processes, and practices that


are designed to protect computers and the things related to computers like
programs, data, and networks from unauthorized access or attack. Ensuring
cybersecurity is indispensable for making cyberspace safe, reliable, resilient,
and trustworthy.

Cybersecurity threats and data breaches:


The dangers in cyberspace that may exploit the vulnerabilities and bring
serious damage are often known as cyber threats. The explosion in innovation
and novel applications has allowed cybercriminals and hackers to compromise
the privacy and security of people using these cyber threats.
It is a very challenging task to keep up with new technologies, security trends,
and threat intelligence. So it is always very necessary for us to protect our data
and information on our computers and take precautions against cyber threats.
These cyberthreats include:

1. Malware
2. Ransomware
3. Social engineering
4. Phishing emails
5. Spams and scams
6. Insider threats
7. Threats on social media

Importance of cybersecurity

In today’s digital world, Cyber-attacks and cybersecurity threats are increasing


at an alarming rate as technologies, threat intelligence and security trends are
upgrading. The incidences of spear phishing are increasing, which
cybercriminals are using to install harmful malware on the computer of the
targeted users and steal valuable data, even money from our bank accounts.
Nowadays, these cyberattacks are being carried out even on social networks.
Therefore, cybersecurity is important as it can protect our valuable and
vulnerable digital assets, such as data, networks, programs and other
information from unauthorized data access, cyber-attacks, viruses and identity
theft.

How can we ensure cybersecurity?

1. Think twice before clicking on links or opening attachments.

Even if an email looks like it's from someone you know, take care with attachments.
Take that extra second to avoid walking into a digitally dangerous situation. Don't
reply to the email because the sender's identity might have been compromised.

2. Verify requests for private information.

Whenever you are requested to provide private information (yours or anyone else's),
verify the identity of the requester — even if it appears to be somebody you know.
Con artists are clever in how they collect information to steal information and
identities. Even if you think you're safe, regularly check your financial statements and
credit reports.

3. Protect your passwords.

Never reveal your passwords to anyone. Make them long, strong, and unique and
use multi-factor authentication (MFA) wherever possible.

 Use a password manager such as LastPass or RoboForm.


 Use different passwords for different accounts.
 Use different passwords for work and home.
 Don't let apps and websites remember your passwords.

You might also like