Thursday, 26 May 2016

Q7 - Digital Security



According to Holly Ellyatt of CNBC, the top 5 cyber-security risks in 2015 in South Africa are:

1.      Ransomware

2.      The internet of things

3.      Cyber-espionage

4.      Increase in cyber theft

5.      Insecure passwords


How do hackers obtain our details?

Ransomware :” a type of malware which restricts access to the computer system that it infects” (Ellyatt, 2015).Specifically targeting endpoints that subscribe to cloud-based storage solutions such as Dropbox, Google Drive, and OneDrive. Once the endpoint has been infected, the ransomware will attempt to exploit the logged-on user's stored credentials to also infect backed-up cloud storage data.

The Internet of Things: “the connection of physical devices such as home appliances and cars to the internet” (Ellyatt, 2015). One should always be aware, when you are online, by checking what links you are clicking on and what files you are downloading.  It is advised to rather download anti-virus software in order to protect yourself and your computer containing its confidential information.

Cyber-Espionage: this is when information is obtained through the internet for use by the government which has become the weapon of choice for them.

Cyber Theft: a new opportunity for hackers lies in when paying by mobile and contactless payments, particularly if retailers do not store payment data securely.

Insecure Passwords: Information for the hackers can be easily found online, especially when sharing information over social media.

How can this be avoided or mitigated?
Make sure you log off of all your accounts once you are finished on them.
Use different passwords for different websites, use both capital and lowercase letters, you can also make use of symbols and numbers.
Use anti-virus software.
Install an inclusive firewall program that can pinpoint unauthorized programs attempting to transmit data other the internet.
Ignore pop-ups.
Never open attachments (unless you’re really sure).
References
Top 5 cyber security risks for 2015. [online] Available at http://www.cnbc.com/2014/12/19/top-5-cyber-security-risks-for-2015.html[Accessed 30 May 2016].
20 ways to keep your internet identity safe from hackers. [online] Available at https://www.theguardian.com/technology/2013/may/12/20-ways-keep-internet-identity-safe [Accessed 30May 2016]. 
7 easy ways to avoid being hacked.2015. Business insider. [online]. Available at: http://www.businessinsider.com/how-to-avoid-being-hacked-2015-4[Accessed 30May 2016]. 



No comments:

Post a Comment