We’ve all seen those movies and television shows where the supporting character is feverishly typing away on a keyboard trying to thwart a cyber attack.
If only entering a few keystrokes was all it took to ensure your data wasn’t stolen by a hacker. In reality, a lot more goes into both hacking information and keeping your data secure.
Before hackers realize you’re a perfect target for a breach, it’s best that you educate yourself on the ins and outs of cyber security. Keep reading to ensure you remain un-hackable.
Cyber security definition
Cyber security is the technique of protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
Think of cyber security as a way to infiltrate information technology systems and exploit all of the data it stores and sends to other networks.
This term applies to so much within the tech industry, from businesses to mobile computing. Consider other industries, like government, finance, and medical organizations, that house extensive sensitive data. Without cyber security, this data could easily be exposed and fall into the wrong hands.
As we store more and more data online, the volume and sophistication of cyber attacks grow, and additional steps need to be taken to protect both sensitive business and personal information. Especially when you consider that implementing these measures is more challenging today due to our reliance on a growing number of devices, as well as many new innovations in hacking.
Did you know? 67% of organizations reported being breached at some point in the past.
Types of cyber security threats
Cyber security isn’t a one-size-fits-all type of threat. Depending on what the hacker is after, there are ways they can go about stealing your information.
- Social engineering: Exploiting human trust to gain access to private data
- APTs (Advanced Persistent Threats): When an unauthorized user invades a network and stays for an extended period of time, stealing data without harming the network
- Malware: Specific software designed to gain access or damage a computer or network
These three types of security threats will target either confidentiality, integrity, or availability.
- Confidentiality attacks: Attacks that steal your personal information related to your identity, like your bank account or credit card number.
- Integrity attacks: Also called leaks, attacks that access and release sensitive information with the intent of exposing the data to the public, causing loss of trust in an organization.
- Availability attacks: Attacks that block users from accessing their own data unless they pay a fee or ransom.
|It can happen to anyone: In October 2018, Facebook admitted that email addresses, phone numbers, and other sensitive details, were stolen from 29 million of their users in a major cyber attack.|
Protecting against cyber security attacks
No one wants to fall victim to an attack, and luckily there are ways to protect yourself. For starters, backing up your files is an absolute must. Whether you’re backing up the photos of your European vacation or data regarding your bank numbers, this is a crucial first step. Going along with this is to always update your devices with the newest software. I know that pop-up to install updates always comes at the worst time, but these updates contain patches that fix security issues.
Next, don’t trust any website that doesn’t feature an HTTPS URL with any of your data. If the URL starts with http://www… this site isn’t secure and you should avoid entering in any information about yourself (like your Social Security Number) at all costs.
Finally, don’t open attachments or links from an email sent from an unknown source. Double check that the email address is one that you recognize and that it isn’t off by an underscore or one missing letter. This can make all of the difference.
Keep your data on lock
Small businesses. Large businesses. Your dad who only uses his computer to check the stock market. No matter who you are or what category you fall under, being informed on cyber security is an absolute must. Anyone can become a target of a cyber attack, so it’s best that you know the signs and how to protect yourself, and all of your data.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea