Home Cybersecurity Cyber-crime, deterrent steps against it.

Cyber-crime, deterrent steps against it.

Cybercrime will generally refer to criminal activity that targets or uses a computer, computer network, or networked device. As the cyberspace grows exponentially, cybercrime has kept pace(Cyber-crime, deterrent steps against it). More and more cyber security incidents are reported each day and hence the need to do more to deter these crimes.

All these cybercrime incidents are broadly classified into three major categories:

  1. Cybercrime against individuals – these exploit the human traits of naivety and greed. Examples include credit card fraud, child pornography, identity theft, harassment and defamation, privacy violations, email spoofing and fraud, cyber extortion, and password sniffing.
  2. Cybercrime against property – mostly perpetrated against intellectual property and installed systems. Notable crimes include intellectual property theft/piracy, cyber vandalism, malware distribution, financial and corporate data theft data diddling, web-jacking, ransomware, cyber-squatting, crypto-jacking, and cyber trespassing. 
  3. Cybercrime against government/society/organizations – constitutes the use of cyberspace to threaten the government or steal critical economic information. Some notable crimes include cyber espionage and spying, denial of service attacks (DoS) and distributed denial of service (DDoS) attacks, malware attacks, network intrusions, and cyber-terrorism. 

In wide-ranging incidences, the big motivation for hackers or other cybercriminals is financial reward. So, how can you protect your computer or network or private data from the imminent threat of cyber-attacks?

  • Keep your operating system and other software up-to-date to get the most recent security patches. 
  • Install anti-virus software and update it regularly for the utmost protection. 
  • Use strong passwords – a combination of letters, numbers, and symbols – to protect private data. 
  • Desist from opening attachments in spam emails or from unknown entities.  
  • Avoid clicking on links in spam emails, suspicious URLs, or opening untrusted websites. 
  • Never give out personal data via phone or email. Always establish who you are speaking to or corresponding with before giving out personal information. 
  • Manage social media settings to avoid leaking personal data to the public.
  • Back up data regularly to minimize the loss/damage in case of a data breach or cyber-attack. 
  • Use a virtual private network (VPN) when accessing public Wi-Fi networks at hotels or airports to prevent identity theft or loss of personal data.
  • Talk to your children about internet usage and speaking out if they encounter online bullying, stalking, or harassment.
  • Keep abreast of incidents of security breaches and change passwords if a website or merchant you have an account on is affected.
  • For entrepreneurs/business owners, develop clear cyber security policies and procedures for employees and incident response and management plans. Undertake continuous training of employees on these policies and steps to take if a security breach occurs.

Always stay on the alert since you can become a victim by letting down your guard. Keep your guard high and know what to do if the worst happens.

Previous articleCybersecurity Risks: How to Address Them While Working Remotely
Next articleCybersecurity and Cyber Resilience: Why Businesses Need Both
Entrepreneur and IT enthusiast, he has been dealing with new technologies and innovation for over 20 years. Field experience alongside the largest companies in the IT and Industrial sector - such as Siemens, GE, or Honeywell - he has worked for years between Europe and Africa, today focusing his energies in the field of Certification and Data Traceability. , with the Blockchain and Artificial Intelligence. At the head of the Lirax project, he is now involved in supporting companies and public administration in the digital transition, in a certain way. Particular attention is paid to the traceability and certification of educational and professional skills, as well as the identification of the person, in compliance with European and international directives. Thanks to his activities carried out in Africa, in the governmental sphere, and subsequently as a consultant for the United Nations and the International Civil Protection, he is carrying out further large-scale projects, in the field of research and development together with international experts, which allow him to done, to broaden his vision and expertise in a unique and transversal way. The voluntary work carried out in various humanitarian missions carried out in West Africa in support of the poorest populations completes his profile. He has participated in the creation of centers for infancy and newborn clinics, in the construction of wells for drinking water and in the creation of clinics for the fight against diabetes
Exit mobile version