According to Holly Ellyatt of CNBC, the top 5
cyber-security risks in 2015 in South Africa are:
1.
Ransomware
2.
The internet of things
3.
Cyber-espionage
4.
Increase in cyber theft
5.
Insecure passwords
How do hackers obtain our details?
Ransomware :” a type of malware which restricts access to the
computer system that it infects” (Ellyatt, 2015).Specifically targeting endpoints
that subscribe to cloud-based storage solutions such as Dropbox, Google Drive,
and OneDrive. Once the endpoint has been infected, the ransomware will attempt
to exploit the logged-on user's stored credentials to also infect backed-up
cloud storage data.
The Internet of Things:
“the connection of physical devices such as home appliances and cars to the
internet” (Ellyatt, 2015). One should always
be aware, when you are online, by checking what links you are clicking on and
what files you are downloading. It is
advised to rather download anti-virus software in order to protect yourself and
your computer containing its confidential information.
Cyber-Espionage:
this is when information is obtained through
the internet for use by the government which has become the weapon of choice
for them.
Cyber Theft: a new opportunity for hackers lies in when paying by
mobile and contactless payments, particularly if retailers do not store payment
data securely.
Insecure Passwords: Information for the hackers can be easily found online,
especially when sharing information over social media.
How can this be avoided or mitigated?
Make sure you log off of all your accounts once you
are finished on them.
Use different passwords for different
websites, use both capital and lowercase letters, you can also make use of
symbols and numbers.
Use anti-virus software.
Install an inclusive firewall program
that can pinpoint unauthorized programs attempting to transmit data other the
internet.
Ignore pop-ups.
Never open attachments (unless you’re really sure).
References
Top 5 cyber security risks
for 2015. [online] Available at http://www.cnbc.com/2014/12/19/top-5-cyber-security-risks-for-2015.html[Accessed
30 May 2016].
20 ways to keep your internet identity safe from hackers.
[online] Available at https://www.theguardian.com/technology/2013/may/12/20-ways-keep-internet-identity-safe [Accessed 30May
2016].
7 easy ways to avoid being hacked.2015. Business insider. [online].
Available at: http://www.businessinsider.com/how-to-avoid-being-hacked-2015-4[Accessed 30May 2016].
No comments:
Post a Comment