What is Cybersecurity?

what is cyber security

Cybersecurity is the technology of protecting networks, devices, and data from unauthorized access or criminal use. In terms of Cybersecurity, confidentiality, integrity, and availability (CIA) are essentials. Nowadays, our lives rely a lot on computers and the internet now. For instance, we use email, smartphones, tablets for communication, use interactive video games, social media, apps for entertainment, use navigation systems for transportation, use the credit card as well as online payment for shopping, and etc. As the Internet brings us an efficient lifestyle, it also comes with many risks:

  • Malware erasing your entire system
  • Attackers breaking into your system and altering files
  • Hackers using your computer to commit crimes
  • Cybercriminals stealing your credit card information and making unauthorized purchases
  • And so on….

 

Even though it is impossible to ensure some of these things will not happen to you when you take the best precautions to prevent cyberattacks, there are some measures you can take in order to minimize the chances to be vulnerable:

Update and Patch Software Regularly and Frequently: By installing software patches regularly and frequently, attackers will not be able to take advantage of some known issues and vulnerabilities. There are a lot operating systems offering automatic updates though, you should absolutely enable the automatic updates when this is set as optional in your device.

Install and Run Up-to-date Antivirus Software: Antivirus software application is one of most efficient and easiest measures to take in order to defense cyberattacks. It can automatically detect, quarantine, and remove various types of malware. Although the best antivirus software will not provide adequate protection against new and advanced threats, such as zero-day exploits and polymorphic viruses, enabling automatic virus definition updates can ensure maximum protection against the latest threats.

Set Strong Passwords for All Your Accounts: Selecting complex or randomized passwords can make it difficult for attackers to guess and occupy your accounts. In addition, it is important to use different passwords for different accounts and devices. It is best to use the passwords that consist of at least 16 characters and a combination of special characters, numbers, and alphabets.

Never Use Default Usernames and Passwords: Changing default usernames and passwords should be the first thing to do when you obtain a new device or a new account as default usernames and passwords are readily available to malicious actors. It is best to change your default usernames and passwords into sufficiently strong and unique usernames as well as passwords.

Implement Two-factor/Multi-factor Authentication (2FA/MFA): Since authentication is a process used to validate a user’s identity, weak authentication processes are easily exploited by attackers. 2FA/MFA uses at least two identity components to authenticate a user’s identity. Therefore, the risk of a cyberattacker gaining access to an account if they know the username and password can be minimized.

Install Firewalls: Firewall is a line of defense in your network to prevent some types of attack vectors. It can block malicious traffic before it enters a computer system and restricts unnecessary outbound communications. Enabling and properly configuring the firewall is significant.

Watch Out Unexpected Emails: Phishing emails, currently one of the most prevalent risks to the average user, always come as unexpected emails. The attackers use phishing emails to gain information about you, steal money from you, or install malware on your device.

 

 

Contact LIFARS Today To Learn About Methods Of

Improving Your Cybersecurity Posture

 

 


Credits:

https://www.us-cert.gov/ncas/tips/ST04-001