Thursday, June 13 2024

Approximately 55% of the world’s population uses the internet. This leaves a lot of room for cyber criminals, so much so that it is estimated that 30% of Europeans have suffered an incident, so it is expected that more than one million new employees dedicated to cyber security will be needed this year in Europe, according to a Orange and Samsung report.

Cyber criminals cash in of our neglect and / or naivety when choosing passwords, for instance . Or our ignorance when it comes to implementing our homes with a lot of smart devices – which are all connected to the network and are therefore vulnerable.

Some of the threats that more problems can bring this 2020 will be given by what they have described as ‘Cold Cyber War’, cyber attacks directed or supported by some states against others. And in this line, it is expected that the targeted ransomware – like the one that has affected companies such as Prisa, Everis, Sacyl or Prosegur in 2019 – will increase even more during this year.

60% of cyber attacks originate from the employees themselves, that is called the insider risk.

As for devices, the rise of the IoT -‘Internet of Things’, Internet of Things- and hyperconnection will cause ransomware attacks to become increasingly common in smartphones and other devices beyond the computer . And also the massive use of the cloud makes it a very interesting objective in the eyes of cyber criminals.

And as a novelty, this year the vulnerabilities are the results of the novelty of 5G and therefore the ‘deep fakes’, videos during which the voice and face of these who appear to distort reality are changed. Cyber criminals are expected to use them as a phishing mechanism against companies or to create, for example, fake pornographic videos of celebrities.

Cyber Security – Be cyber aware

While the threat of suffering a cyber attack is there and it’s advisable to not live terrified by it or attempt to disconnect from everything sort of a lunatic, it is also vital to take care and take precautions.

We start with the essentials: passwords. Please stop using your dog’s name or your child’s birthday. It seems very basic, but ‘password’ and ‘12345’ continue to crown the worldwide list of the most used passwords. That’s the way humans are.

So if you don’t want to be hacked, look for something safer; combine numbers, uppercase letters, lowercase letters and symbols; and, above all, do not put the same password for everything, choose one for each service.

It is also essential that you protect the equipment you use. No matter how tedious the updates are, do them. They are fundamental as many correct security holes. Also, implement antivirus and anti-malware systems on your devices.

But in particular things, what you’ve got to try to to if you would like to be protected within the Digital Age is to use your head: don’t open suspicious emails or download apps of doubtful origin. And, as far as possible, avoid giving an excessive amount of personal data.

Previous

Cyber attacks in 2020: how they will affect you and how to prevent them.

Next

Career Options With Blockchain Technology

Check Also

Widget

Don’t Miss

One Cloud

Trend Micro Cloud One: A Comprehensive Review

Ellie Buscemi

What is Cloud One by Trend Micro? The Cloud One platform by Trend Micro is a cloud posture security management (CPSM) product that focuses on providing security in the cloud to businesses. Trend One is designed for businesses whose infrastructure relies on a mix of cloud applications and older device-based programs. Examining the security capabilities […]

Best Security Information and Event Management (SIEM) Solutions

Lara Oporto

A Security Information and Event Management system (SIEM) is typically most needed in larger organizations or those with complex IT infrastructures where there’s a high volume of security events and logs generated from various sources. Companies often invest in SIEM when they require comprehensive visibility into their network activities and want to centralize security monitoring […]

Best Browser Security Products

Ellie Buscemi

What is Browser Security and how does it work? Browser Security is a subcategory of cybersecurity that focuses on minimizing a user’s vulnerability to cyber threats while they use the worldwide web. These cyber threats include phishing web pages, session hijacking and malware, which can be injected onto a device by means of tamped-with web […]

Headshot of BastionZero CEO Sharon Goldberg

Cloudflare Acquires BastionZero to Enhance SASE Offering

Nico Davidoff

Acquisition Aims to Boost Cloudflare One’s Capabilities Amidst Growing SASE Market Competition Cloudflare has acquired BastionZero, a zero trust infrastructure platform, in a move aimed at enhancing its Cloudflare One secure access service edge (SASE) offering. The acquisition underscores Cloudflare’s commitment to expanding its presence in the growing SASE market. Cloudflare reported first-quarter revenue of […]

Best Secure Access Service Edge Platforms

Lara Oporto

What is SASE and how does it work? Secure Access Service Edge (SASE) is an architectural model that combines network connectivity with security functions, all delivered through a unified cloud platform or centralized policy control. In contrast to the traditional approach, where network security relies on a multitude of distinct functionalities like firewalls, Virtual Private […]

Best Data Security Posture Management (DSPM) Products

Ellie Buscemi

What is Data Security Posture Management and how does it work? Data Security Posture Management (DSPM) tools focus on protecting data by continuously tracking where it is located and who has access to it. DSPM refers to a set of methods that cybersecurity professionals use to better understand their sensitive data like what it is, […]