Saturday, April 13 2024

Approximately 55% of the world’s population uses the internet. This leaves a lot of room for cyber criminals, so much so that it is estimated that 30% of Europeans have suffered an incident, so it is expected that more than one million new employees dedicated to cyber security will be needed this year in Europe, according to a Orange and Samsung report.

Cyber criminals cash in of our neglect and / or naivety when choosing passwords, for instance . Or our ignorance when it comes to implementing our homes with a lot of smart devices – which are all connected to the network and are therefore vulnerable.

Some of the threats that more problems can bring this 2020 will be given by what they have described as ‘Cold Cyber War’, cyber attacks directed or supported by some states against others. And in this line, it is expected that the targeted ransomware – like the one that has affected companies such as Prisa, Everis, Sacyl or Prosegur in 2019 – will increase even more during this year.

60% of cyber attacks originate from the employees themselves, that is called the insider risk.

As for devices, the rise of the IoT -‘Internet of Things’, Internet of Things- and hyperconnection will cause ransomware attacks to become increasingly common in smartphones and other devices beyond the computer . And also the massive use of the cloud makes it a very interesting objective in the eyes of cyber criminals.

And as a novelty, this year the vulnerabilities are the results of the novelty of 5G and therefore the ‘deep fakes’, videos during which the voice and face of these who appear to distort reality are changed. Cyber criminals are expected to use them as a phishing mechanism against companies or to create, for example, fake pornographic videos of celebrities.

Cyber Security – Be cyber aware

While the threat of suffering a cyber attack is there and it’s advisable to not live terrified by it or attempt to disconnect from everything sort of a lunatic, it is also vital to take care and take precautions.

We start with the essentials: passwords. Please stop using your dog’s name or your child’s birthday. It seems very basic, but ‘password’ and ‘12345’ continue to crown the worldwide list of the most used passwords. That’s the way humans are.

So if you don’t want to be hacked, look for something safer; combine numbers, uppercase letters, lowercase letters and symbols; and, above all, do not put the same password for everything, choose one for each service.

It is also essential that you protect the equipment you use. No matter how tedious the updates are, do them. They are fundamental as many correct security holes. Also, implement antivirus and anti-malware systems on your devices.

But in particular things, what you’ve got to try to to if you would like to be protected within the Digital Age is to use your head: don’t open suspicious emails or download apps of doubtful origin. And, as far as possible, avoid giving an excessive amount of personal data.

Previous

Cyber attacks in 2020: how they will affect you and how to prevent them.

Next

Career Options With Blockchain Technology

Check Also

Widget

Don’t Miss

The words Endpoint Detection and Response (EDR) on a green background with lines on the right side of the image

Best Endpoint Detection & Response Platforms

Lara Oporto

Endpoint Detection & Response platforms continuously monitor endpoints for signs of malicious activities, such as unauthorized access or unusual behavior, enabling rapid detection and response to potential cyber threats to safeguard organizational assets. What is Endpoint Detection and Response and how does it work? Endpoint Detection and Response (EDR) is a cornerstone in modern cybersecurity […]

AT&T AlienVault Products Review: OSSIM vs USM

Ellie Buscemi

AlienVault is now the technological basis for AT&T AlienLabs and provides multiple products for different companies’ cybersecurity needs. What AT&T AlienVault Products are Available? In December 2021, CISOstack reported that AT&T intended to acquire AlienVault to expand its cybersecurity offerings to more businesses. Two years later, AlienVault-based offerings make up a large portion of AT&T’s […]

Photo by Simon Kadula on Unsplash.

Navigating Manufacturing IIoT Cybersecurity Challenges

John Powers

Guarding the Gears: Government policy and industry collaboration to mitigate cyberthreats to manufacturers. The smart factory is on the rise. Production lines equipped with advanced sensors can monitor equipment health in real-time and predict potential issues before they disrupt operations. Temperature and humidity sensors can ensure the optimal environment for delicate manufacturing processes. RFID-enabled asset […]

Best Microsegmentation Software

Ellie Buscemi

Microsegmentation allows a company to divide digital assets into smaller, more secure groups, which makes it harder for cybercriminals to take over a company’s data center. What is Microsegmentation? Microsegmentation refers to cyber professionals building layers of cybersecurity protection between groups of digital assets or individual cyber assets. Adding these layers inside instead of only […]

Best Breach and Attack Simulation Platforms

Ellie Buscemi

Breach and attack simulation (BAS) platforms allow companies to see weaknesses in their cyber infrastructures before a malicious hacker can exploit them. What Is BAS – Breach and Attack Simulation? Breach and attack simulation (BAS) is an approach to cybersecurity that uses advanced tools to imitate the attacks used by cybercriminals on companies’ digital infrastructure. […]

Ofer Ben-Noon and Ohad Bobrov

Palo Alto Networks to Acquire Talon

Ellie Buscemi

On Monday, Palo Alto Networks agreed to acquire Israeli startup Talon Cyber Security, an enterprise browser platform. The deal values Talon at between $600 to $700 million, according to The Information. Palo Alto will integrate Talon’s enterprise browser solution into its Prisma SASE product. The acquisition comes among a wave of acquisitions and releases involving […]