Cyber Security-The Responsibility
"Attackers are evolving their tactics to take
advantage of workplace technology trends, including the cloud and BYOD"
INDIA has one of the highest number of internet user in the world and is also in the top countries facing cyber-crime.Today ,hackers to commit malicious activities on digital systems or networks with the intention of stealing sensitive company information or personal data, and generating profit. cyber criminal motive not only limited to hacking & money but also become critical point of national cyber security.The U.N. disarmament chief says the COVID -19 pandemic is moving the world toward increased technological innovation and online collaboration, but “cyber crime is also on the rise, with a 600% increase in malicious emails during the current crisis.”‘It is estimated that one cyber attack takes place every 39 seconds’.According to the International Telecommunication Union, “nearly 90 countries are still only at the early stages of making commitments to cyber security,” Ms.. Nakamitsu said.
During this period all the private as well as government offices have remained closed and most employees are working from home, making security the next major concern.Apart from company’s information, personal sensitive information and financial information of an individual is also at risk in view of the increase in the Cyber Attacks. phishing attacks, Malspams and ransomware attacks as attackers are using COVID-19 as bait to impersonate brands thereby misleading employees and customers. This will likely result in more infected personal computers and phones. Not only are businesses being targeted, end-users who download COVID-19 related applications are also being tricked into downloading ransomware disguised as legitimate applications.
Perhaps what’s most shocking in the development of COVID-19-themed attacks is the behavior of larger ransomware organizations themselves. It’s nearly impossible to advocate for groups like “Doppelpaymer” and “Maze”; they are large organizations that deploy and facilitate the payments of ransomware. However, recent statements regarding the changes they plan to make during COVID-19 seem genuine.
For individuals who still log in to their devices strictly for personal use, there is a storm of phishing emails that cling to COVID-19 for sensational, “click me” purposes. Procedures known as “open redirects” (where one website automatically directs to a malicious one) and “business email compromise” (when an email appears to be from a trusted organization) are the most common in phishing attempts.
What’s new in this era is the messaging within the emails: the CDC asks for donations in Bitcoin. Your COVID-19 Tax Relief Documents are available on this website. A doctor from the World Health Organization has “drug advice” if you click here. This is social engineering at its worst — and unfortunately, it’s more likely to work in these uncertain times. People haven’t become more gullible in the past three and a half months; they’ve become used to big changes in small messages. When the next news headlines could be a matter of safety or sickness, it’s much easier to believe information that appears right in your inbox.
COVID-19 has certainly changed the fabric of society. While the journey ahead is uncertain, it’s a comfort to reflect on what we know and what we can control. Hackers will continue to exploit people’s fears. Hackers will even continue to threaten critical infrastructure. One thing is certain: staying aware of the risks that lie ahead puts you in a better position of not falling for them tomorrow.We work in an always on, digital world where we are electronically connected every minute of every day.
It’s important to recognize the different types of risks that exist in the online world. When online, keep this in mind: Stop. Think. Connect. Stop for a moment. Think about how you will take care of your information and personal data before acting. Connect responsibly. Following are some descriptions of risks, and some actions you can take.
How to keep yourself safe :-
- Check the App details on Playstore before downloading it, this includes, details of the developer, their website (if any), reviews and ratings given by other users.
- Avoid downloading apps from third-party stores and websites, and download the apps only available in App Store for Apple IOs users and Google Playstore for Android users.
- Do not open email attachments that you have not asked for. In case you so receive an attachments, it is always safer to open the same from WHO’s official website and not the attachment in the mail.
- Always pay attention to the type of personal information you are asked to share. There is always a reason why your personal information is needed. In no circumstances, there would be a need for your passwords.
- Do not believe any emails that come with a sense of panic. Legitimate organizations will never want you to panic and they always take the processes step by step.
- Do not believe that WHO or any other organization conducts lotteries or offer prizes, grants or certificates through emails
The internet is built to enable collaboration – in fact, that concept drove its creation. Unfortunately, malicious actors have learned this lesson all too well and it is part of what makes them so dangerous and effective. On the defenders' side, we’ve known for a long time that we need to collaborate to combat cybercrime, but we haven’t figured out how to do so effectively. With the conceptual framework emerging from the Forum’s initiative, we now have the first step needed to make collaboration a reality
"a secure and functioning cyberspace” is therefore more pressing than ever and he condemned cyberattacks targeting hospitals, medical research facilities and other infrastructure, especially during the pandemic".
"We need to rethink cybersecurity for a post-pandemic world"!!
Senior System Engineer
4 年Pushpa Kale beneficial information