You and The Cyber Attacker – How to Stay Secure

Cybersecurity is a vital issue for everyone and every company. Especially in our highly interconnected world, and as high-profile breaches are increasing, there is a burgeoning importance of security measures which need to take place immediately.

Therefore this article serves as a little handbook for both users as well as employers. Here you will learn about the most common cyber attack methods and respectively – how to obviate those attacks.

1. Phishing

According to Verizon’s Data Breach Investigation Report in 2021 (see [1]), 36% of data breaches involve phishing. So what is this type of attack?

It is a form of social engineering. The attacker tries to manipulate the user by sending malicious links or downloading malware. Examples of this intrusive software is a worm or a virus. One should also be aware of so-called vishing or ‘voice’ phishing, a procedure where the attacker tricks the victim into revealing sensitive information like PINs or passwords.

ADVICE

a. Healthy suspicion

The first step is always to be aware of potential risks. Hence, it should be a must to participate regularly in cybersecurity events or trainings. Trough several awareness trainings, the possibility of falling for a phishing attack can be reduced.

b. E-mail attatchments

Never open attachments from unknown parties or klick on them when you are not sure whether you should open it. The phishing attacks are as sophisticated by now as they appear to be sent by a person you know and can thrust. Here the awareness needs to be number-one priority. 

c. Administrator mode

Make sure that you are not in the ‘Administrator mode’ as long as you don’t want to install something from trusted websites. This is important, since hackers have the opportunity to install malicious code or make their evil business on your computer. So try to never be compromised!

2. Ransomware

a business will fall victim to a ransomware attack every 14 seconds in 2019, and every 11 seconds by 2021.
In 2021 it is predicted to only 11 seconds..

Wannacry (2017)- one of the biggest worldwide cyberattack – is an example of a ransomware – a malicious software designed to extort money from the victim. The access of the victim’s data is denied until the ransom is being paid. Wannacry took place in May 2017. It targeted people using the Windows operating systems

ADVICE:

Backups

Malware attacks on the Internet often result in data damage. As a result it is recommend to create backup copies. Important: Store data backup on external media or in the cloud.

Basic MUST-Do’s

1. Secure and strong passwords

How to build a strong password:

  • More than 12 characters
  • Use multiple  groups of characters
  • Can not be found in a dictionary
  • It is not Key pattern on the keyboard
  • Case-sensitive
  • Always use different passwords for each service

2. E-mail attatchments

Never open attachments from unknown parties or klick on them when you are not sure whether you should open it. The phishing attacks are as sophisticated by now as they appear to be sent by a person you know and can thrust. Here the awareness needs to be number-one priority. 

3. Check installed software

Always make sure to remove unused software or programs. Have a clear mind when it comes to desktop organization. And only download from trusted websites!

MY BIGGEST ADVICE

And of course – Keep being curious – everywhere and every time something unusual can take place.

It is your duty, your will to protect not only yourself but also your teammates, friends, family.

References:

[1] https://www.verizon.com/business/resources/reports/dbir/

Picture:


Dilem Kaya' Avatar


Leave a Reply