Adopting a cyber-secure mindset

Issue 5 2022 Security Services & Risk Management, Cyber Security


Simeon Tassev.

Cybercrime is nothing new, but recently there has been a spate of reported vulnerabilities that have brought the topic back into the spotlight. This includes a security flaw in Apple devices, generally thought to be secure, which hackers have actively exploited to gain full control over iPhone, iPad and Mac devices.

Malware attacks are now more of a threat than ever, and neither individuals nor businesses can afford to be complacent about cybersecurity. Adopting a cybersecure mindset is key to mitigating the risk of falling victim to the growing cybercrime pandemic.

Evidence in the numbers

There can be no doubt that cybercrime is a challenge that affects every single person using a connected device, and ransomware is among the biggest threats we face. The 2022 SonicWall Cyber Threat Report demonstrates the magnitude of the challenge: in 2021 there were 623 million ransomware attacks globally, which represents a 105% increase over 2020. In addition, the report highlights a sharp increase in encrypted threats, with 10 million attacks globally, as well as 97 million incidents of cryptojacking.

Not just a corporate problem

The repercussions of a successful ransomware attack can be devastating for a business, causing downtime, loss of productivity, reputational damage, compliance breaches and more. However, it is important to understand that cybersecurity is not just a corporate problem, because it can personally affect individuals whose identity and money can be stolen, whose data can be compromised, whose devices could be completely wiped, and whose lives can be badly affected by a malware breach.

The reality is that cybersecurity is everyone’s problem, and we need to be more aware of the threats and how they can affect us personally, as well as those around us. We need to develop a cybersecure mindset by taking responsibility for how we connect and how we behave while connected, to protect not only ourselves but others around us as well.

No such thing as ‘set and forget’

Security is not something that anyone can afford to take for granted. Even Apple devices, which many have complacently thought to be secure enough not to require external security solutions, are increasingly targets for attack. Cybersecurity is also not a technology that can simply be put into place and forgotten about. It needs to be constantly refreshed and updated to ensure it provides adequate protection against a constantly evolving threat landscape.

Above all, understand the risks

Being prepared for the worst-case scenario is key, but often it pays to go back to the basics. Make sure that you have backup and data protection, antivirus and anti-malware, and all of the appropriate technology in place, including mobile device protection, but do not rely only on these solutions. A multi-layered solution can help to build a solid security foundation, but human behaviour can override even the strongest of security frameworks. Understand the risks and the consequences when it comes to cyberthreats and ensure that being cybersecure is always top of mind.

For more information contact Galix, 0861 242 549, [email protected], www.galix.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Industrial control systems under attack
News Cyber Security
According to Kaspersky ICS CERT statistics, from January to September 2022, 38% of computers in the industrial control systems (ICS) environment in the META region were attacked using multiple means.

Read more...
The Deposita Protector 3000 d-s1
Deposita Security Services & Risk Management
The Protector 3000 d-s1, designed for medium-sized enterprises, improves the level of security at the business and helps optimise resources by streamlining cash-handling processes.

Read more...
Top fraud trends to watch in 2023
News Security Services & Risk Management
Even though financial concerns remain a significant obstacle for companies in implementing new anti-fraud technologies, 60% of businesses expect an increase in their anti-fraud technology budgets in the next two years.

Read more...
Be cautious when receiving deliveries at home
News Perimeter Security, Alarms & Intruder Detection Security Services & Risk Management
Community reports of residents being held up at their gate when collecting fast food deliveries at home are once again surfacing.

Read more...
Sasol ensures Zero Trust for SAP financials with bioLock
Technews Publishing Editor's Choice Cyber Security Security Services & Risk Management
Multi-factor authentication, including biometrics, for SAP Financials from realtime North America prevents financial compliance avoidance for Sasol.

Read more...
Accelerating your Zero Trust journey in manufacturing
IT infrastructure Cyber Security Industrial (Industry)
Francois van Hirtum, CTO of Obscure Technologies, advises manufacturers on a strategic approach to safeguarding their businesses against cyber breaches.

Read more...
Protecting yourself from DDoS attacks
Cyber Security Security Services & Risk Management
A DDoS attack, when an attacker floods a server or network with Internet traffic to prevent users from accessing connected online services, can be costly in both earnings and reputation.

Read more...
Cyber resilience is more than cybersecurity
Technews Publishing Editor's Choice Cyber Security Integrated Solutions IT infrastructure
Hi-Tech Security Solutions held a round-table discussion focusing on cyber resilience and found that while the resilience discipline includes cybersecurity, it also goes much further.

Read more...
Crossing the chasm
Editor's Choice News Security Services & Risk Management Training & Education
Industry reports suggest that in the next ten years, millions of jobs could go unfilled because there simply are not enough people to fill them.

Read more...
Records in place now, not later
Editor's Choice Security Services & Risk Management
It is important, after an incident, to have records in place as soon as possible. Too often the matter is left for the day when the company is going to court, or a disciplinary hearing is scheduled.

Read more...