With handheld devices becoming more and more ubiquitous

With handheld
devices becoming more and more ubiquitous each day and networking having its
roots so deeply embedded in our lives, the world around us is becoming more and
more cyber and technologically advanced with each passing day and it’s hard to
avoid the threats it entails.

 Cyber attackers range from sophisticated
hackers to naive teenagers using cyber vulnerabilities to their advantage. One
such threat reported as of May 2017, when the world witnessed one of the worst
cyber outcries, Wanna Cry Ransomware, a malicious malware that affected
thousands of companies in over 150 countries. Britain’s Nation Health Service
was worst hit by the attack and it also brought many of Spain’s top companies
to a halt. This malicious malware first targeted computers functioning on obsolete
versions of Microsoft Operating System and then infected other systems on the
network. The attack lasted 4 days bringing about an extensive damage of hundred
billion dollars.  

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

Numerous businesses
and institutions now function solely on technology and share sensitive data and
effectuate transactions over networking. This advancement makes cyber security indispensable
and calls for a robust and standardized solution to remedy technological
vulnerabilities that can compromise one’s identity and privacy and at times
cost livelihood. Enlisted are some of the most effective measures to protect
your computer and keep your data intact:

Strong Passwords: Implementing complex and various alpha-numeric
combinations for a password can prevent an attack or an unwanted encroachment
of your devices to an extent.

Data back-up: Performing regular back-up for your data is a key feature of data
security. In case our security systems get compromised causing loss of data, we
still have access to our data.

Implementing control access and updating systems and installing
Intrusion Detectors: Restricting
data and service access to limited authorized personal and controlling physical
approach to the premise can help keep threats at bay.  Also keeping critical data offline and its
limited sharing is crucial. Timely updating our security systems can help us
stay one step ahead of the attackers. Intrusion Detectors helps monitor network
traffic and alerts and issues warning on detecting any suspicious activity.

Installing Firewalls, Antivirus programs:  Firewall filters
the incoming and outgoing data on a network and block malicious content from
infecting your systems. Also prevents navigating insecure websites and potentially
threatening content from being downloaded to your computers. Antivirus
programs, on the other hand monitors your systems for any unusual behavior, traces
and destructs any dangerous software or viruses.

Data Encryption: Encryption adds an extra wall of security to sensitive
information stored on a system or a network. It employs a systematic algorithm
to encrypt data to a code formally called ciphertext
which can only be read if one has the permitted key or password to access
that data , restricting data interpretation and manipulation.  

·      Cyber-crime Insurance: Small or large scale business projects shall issue a cyber-crime insurance that can cover for their losses in case of a cyber attack.


I'm Garrett!

Would you like to get a custom essay? How about receiving a customized one?

Check it out