How to Secure Your Cyberspace?
Talk or Email us, Subscribe to our ‘Know Your IT Series on Cybersecurity’.
Cyberspace is essentially made up of three things – Hardware, Software and Networks.
Securing Cyberspace means, securing Hardware, Software and Networks individually and collectively.
In this Unit we take a closer look at threats to our cyberspace
Remember Cyberspace is an Enabler!
Thanks! To Cyberspace we can communicate, stay informed and entertain ourselves.
Some of us spend more time in Cyberspace than we should be!
Unfortunately, “bad guys” can enter our cyberspace; threaten us, and breach the security of our space.
Defending Your Territory
Once you define your security perimeter, we can start examining the various threats based on how you use Cyberspace
For example, if you are using Cyberspace for email communication, “bad guys” can use that channel to enter your cyberspace.
When your browsing the Internet, the “bad guys” can lead you to a malicious website and collect “sensitive information” from you.
“bad guys” can use available channels to enter your cyberspace and breach its security. There are no rules in this game!
“bad guys” can exploit our weaknesses, ignorance or trick us into providing information that can be used to the breach the security of our cyberspace.
Defending cyberspace is a collaborative activity and requires the active participation of all users within a security perimeter.
It is important to categorize the kind of threats we can face to manage our Cybersecurity defenses.
It is easy to get overwhelmed and fall prey to simple attacks from the “bad guys”.
Identifying threats to your cyberspace is called, Threat Modeling. Talk to us or email us on how to model threats to your cyberspace.
Information available about existing threats is called, Threat intelligence
Use the ideas of threat modeling and threat intelligence to collect more information about threats
The three biggest threats when you are working from home are:
Examples of Threats and Defenses
Threats to Software on your computer
Malware – malware include computer virus and other rogue programs that make the computer unusable.
Threat to your Business Operation
Ransomware – “bad guys” take possession of your cyberspace and demand money to return it.
Threat to your data and privacy
Phishing – the “bad guys” collect sensitive information by laying a trap delivered as an email or through social media
Following a few simple steps, can improve your defenses manifold.
- For Malware
Patch all Software and install an Antivirus on your computer
- For Ransomware
Backup your critical data and have Disaster Recovery plan ready.
- For Phishing
Be alert and cautious before opening emails, clicking links or responding in Social media
Look out! For Threat Indicators
The following are some threat indicators (you may need to investigate further before drawing any conclusions)
- While using your computer:
- Slow computer, unusual error messages
- Desktop has new icons and shortcuts that you did not create
- Unwanted pop-ups and notifications
- Task manager shows programs not initiated by you (unknown services)
2. While browsing the Internet:
- Annoying Ads and Pop-ups
- Browser hanging often
- The Address bar showing an unlocked sign
3. While sending and receiving Emails:
- Email sent out without your express action (friends receive messages you never sent)
- Email received from malicious sender
- Email containing malicious links or attachments
Some Third Party Online Resources
Examples of Phishing - This webpage provides an overview of various attack vectors for email phishing. Takes about 10 minutes for a quick read.
Protecting Ourselves from Ransomware.
Frequently Asked Questions regarding safe browsing
Remember! You Can Stay Safe Online
Remember! You can stay safe online.
Securing Cyberspace is a 24/7/365 activity. Call or email us for support and education.