Cybersecurity Awareness Month is Here…And It’s Not Time to Let Your Guard Down

October is cybersecurity awareness month! The modern tradition started in 2004. The President and Congress dedicated this month to urging individuals and organizations to protect themselves from online threats. Since then, the government and private businesses have worked to raise awareness about digital safety every year during the month of October.

The root of technology is people. People create technology, manage it, and improve it. That means that people can also keep it safe. At Restech, we keep it safe by providing security services for our clients and educating our followers about the dangers of cyber attacks. Obviously, right? Odds are you might not work at a cybersecurity firm. That’s ok! You can do a lot to promote cybersecurity awareness in your own life and at your workplace.

Before you can protect yourself, you need to know what you are protecting yourself from. Below are a few types of cybersecurity threats that you should be aware of in the event of a hack.

Malware: Malware is a broad term to describe malicious software. That could be a virus, ransomware, spyware or worms. These tactics work by altering files, deleting them, infiltrating files to find passwords and sensitive information…or they even send information from your computer. Making the appearance of you without your knowledge.

Ransomware: Ransomware works by using malware to encrypt files and prevent access to them. Normally, the attacker will extract the information and threaten the owner in exchange for payment, a ransom.

Social Engineering: Social engineering involves attackers posing as other people or companies. Attackers disguise themselves with brand images or sometimes pretend to be your friends to gain your trust and get information or install malware.

Phishing: Phishing is a type of social engineering. It uses emails, texts, or calls that appear to be from a reputable brand or perhaps a person that you know in order to get users to click a link or provide information. Many times seeing the email address of the person it comes from will show an unrecognized address, but the name is recognizable.

Insider Threat: Insider threats are a little different than other forms of cyberattacks. These involve people who already have access to the system you may work from. That includes employees, customers, or anyone with access. Insider threats can be unintentional, such as when an employee clicks on a suspicious link or accidentally shares sensitive information.

Advanced Persistent Threat: One of the more dangerous attacks. In this type of threat, attackers infiltrate your systems but remain undetected. That means that it can steal information without triggering an alert system for an extended period of time.

We are constantly attached to the internet. Our phones have become an extension of ourselves, most of us work on computers, and even our air conditioners are attached to the internet. It’s everywhere and that means that a lot of our activity online is second nature. We might not pay attention to what we are doing.

This month, take time to focus on what you are doing online and how you are doing it. You can also refer to Vince’s recent article on cybersecurity apathy to learn more about why these things are so important. Click the link here.

Below are a few things you can do this month to participate in cybersecurity awareness month within your company or on your own.

Pay Attention

Roaming the internet is just natural at this point. Scrolling is as easy as tying our shoes.

Take some time the next time you browse the internet. What are those cookie messages that pop up on various websites? What information are they using? How are they using that information? It may take a little reading, but you might be surprised by what you find.

Take Advantage of Password Managers and Protect Your Information

Password managers are advancing as quickly as hackers. They can determine whether or not your passwords are working effectively and if there has been an attempt to log in. These features are also available on browsers. Safari and Google Chrome will provide insight into the strength of your passwords.

Google Chrome even has a security checkup feature this month that will assess your security situation and offer solutions to ensure your data is protected.

Adopt a Zero-Trust Security Plan

A zero-trust security plan is based on assuming that you cannot trust access requests. This does not mean that you cannot collaborate online, it just means that you should explicitly check all access requests. Your initial assumption should be that any request will lead to a breach. This will force you to be more conscious about who you allow access to.

By paying attention to your online activity you can more effectively avoid cyberattacks and breaches. Encourage your coworkers, friends, and family to take advantage of the month and strengthen your security.

For more information or a more in-depth security plan for your business, call Restech. We offer security training for your team to make sure you are completely protected.