In this age of modern technology, we couldn’t imagine ourselves without mobile phones, tablets and laptops. These electronic devices serve an essential part of everyone’s day to day lives. While experiencing all the advantages of these technologies, we don’t notice that there are certain downsides of always using these devices.
Face to face conversations has been replaced with instant messages and text messages. When celebrating special occasions, no one looks at each other’s eyes anymore but everyone is looking down on their own devices. In the offices, instead of setting up a meeting to discuss a certain matter, emails are being sent to everyone instead.
We don’t go out of our houses and offices that much anymore because we communicate to others and entertain ourselves with the different forms of technologies, but that doesn’t mean that we are always safe from all the dangers and there is a greater risk of cyber attacks.
According to Sancy Suraj of Knowles Training Institute, “Every organization faces cyber threats. Larger organizations tend to have a much better understanding of the cyber threats they face, many SMEs in Singapore are still unclear about the ways in which they’re vulnerable”
Organizations need a body of technologies, processes and practices designed to protect networks, programs, and data from attack, damage or unauthorized access which is called the cybersecurity. In the world of computers and gadgets, all of us must have physical security and cybersecurity. Establishing cybersecurity depends upon the systematized efforts throughout an information system.
Elements of cybersecurity include application security, information security, network security, disaster recovery, business continuity planning, operational security and end-user education.
According to the 2014 Cyber Security Intelligence Index, an astounding 95 percent of all security incidents involve human error. The most prevalent mistake is double clicking on an infected attachment or unsafe URL.
A cyber attack is deliberate exploitation of computer systems, technology-dependent enterprises and networks. To alter computer code, logic or data which results in disruptive consequences that can compromise data and lead to cybercrimes, it uses malicious codes.
According to Forbes, the global cybersecurity market reached $75 billion for 2015 and is expected to hit $170 billion in 2020. Cyber attacks may include the consequences such as identity theft, extortion, malware, pharming, phishing, spoofing, spyware, Trojans and viruses.
It is also known as Computer Network Attack which results to breach of access, password sniffing, system infiltration, website defacement, intellectual property theft and unauthorized access.
One of the most precarious elements of cybersecurity is the quickly and constantly evolving nature of security risks. The traditional approach only focuses on the most crucial components and protection against the biggest known threats.
Adam Vincent, the CTO-public sector at Layer 7 Technologies (a security services provider to federal agencies including Defense Department organizations), describes the problem, “The threat is advancing quicker than we can keep up with it. The threat changes faster than our idea of the risk. It’s no longer possible to write a large white paper about the risk to a particular system.”
Some organizations work to design a risk-aware culture where employees are educated about the cybersecurity hazards faced by the company so that they can also train team members about the suitable actions to defend against them.
They can establish cybersecurity in the company through training courses, simulated phishing exercises, awareness campaigns, videos and a steady stream of awareness messaging.
Companies can leverage the use of modern technologies in the workplace but they also need to keep in mind that without proper education and training about cybersecurity, cyber attacks can ruin every aspect of their business.
© 2018 The Tech Cellar. All Rights Reserved.
contribution; Sancy Suraj, CEO of Knowles Training Institute.