1250x260_Light
1250x260

Cyber-crime, deterrent steps against it.

Date:

Cybercrime will generally refer to criminal activity that targets or uses a computer, computer network, or networked device. As the cyberspace grows exponentially, cybercrime has kept pace(Cyber-crime, deterrent steps against it). More and more cyber security incidents are reported each day and hence the need to do more to deter these crimes.

All these cybercrime incidents are broadly classified into three major categories:

  1. Cybercrime against individuals – these exploit the human traits of naivety and greed. Examples include credit card fraud, child pornography, identity theft, harassment and defamation, privacy violations, email spoofing and fraud, cyber extortion, and password sniffing.
  2. Cybercrime against property – mostly perpetrated against intellectual property and installed systems. Notable crimes include intellectual property theft/piracy, cyber vandalism, malware distribution, financial and corporate data theft data diddling, web-jacking, ransomware, cyber-squatting, crypto-jacking, and cyber trespassing. 
  3. Cybercrime against government/society/organizations – constitutes the use of cyberspace to threaten the government or steal critical economic information. Some notable crimes include cyber espionage and spying, denial of service attacks (DoS) and distributed denial of service (DDoS) attacks, malware attacks, network intrusions, and cyber-terrorism. 

In wide-ranging incidences, the big motivation for hackers or other cybercriminals is financial reward. So, how can you protect your computer or network or private data from the imminent threat of cyber-attacks?

  • Keep your operating system and other software up-to-date to get the most recent security patches. 
  • Install anti-virus software and update it regularly for the utmost protection. 
  • Use strong passwords – a combination of letters, numbers, and symbols – to protect private data. 
  • Desist from opening attachments in spam emails or from unknown entities.  
  • Avoid clicking on links in spam emails, suspicious URLs, or opening untrusted websites. 
  • Never give out personal data via phone or email. Always establish who you are speaking to or corresponding with before giving out personal information. 
  • Manage social media settings to avoid leaking personal data to the public.
  • Back up data regularly to minimize the loss/damage in case of a data breach or cyber-attack. 
  • Use a virtual private network (VPN) when accessing public Wi-Fi networks at hotels or airports to prevent identity theft or loss of personal data.
  • Talk to your children about internet usage and speaking out if they encounter online bullying, stalking, or harassment.
  • Keep abreast of incidents of security breaches and change passwords if a website or merchant you have an account on is affected.
  • For entrepreneurs/business owners, develop clear cyber security policies and procedures for employees and incident response and management plans. Undertake continuous training of employees on these policies and steps to take if a security breach occurs.

Always stay on the alert since you can become a victim by letting down your guard. Keep your guard high and know what to do if the worst happens.

Popular

Subscribe to our newsletter


Your emaill address should be use only for updating you on our articles, in the respect of the privacy law

Share post:

More like this
Related

Ways to Avoid Social Engineering Attacks

When we mention cybersecurity, our attention often goes to hackers who exploit vulnerabilities. We often narrow our thoughts to vulnerabilities in data networks. But there is another - called social engineering.

How AI is Changing Work Structures

Greater numbers of individuals, businesses, and governments are embracing artificial intelligence. This has led to growth in certain sectors of the global economy. But there is a growing gap between those businesses and sectors who benefit from AI and those who don't.

How to Protect Yourself from Cyber Attacks

The business threat environment changes frequently. New forms of attack emerge daily. To ensure the stability and security of your system, take an integrated approach. Ensure you put in place different levels of protection and regularly analyze possible threats.

Why Blockchain is The Future

Blockchain is useful in areas where there are many participants in the process and few intermediaries. Insurance, healthcare, and government organizations can also benefit from this technology.