Unit 4 – Question 3


Nowadays, more people are taking advantage of storing personal information digitally, whether that is bank details for quick payments, email, chat rooms, or placing an online order for food. So, it is very easy for cyber-attacks to happen.

Hackers will continue to find ways to steal passwords to bank or credit card accounts so that they can steal money. In addition, hackers can copy social media accounts by posing as the original account holder to trick the holder’s contacts into giving some information.

Cyber threats will continue to plague businesses because working-from-home has forced companies to grant access to previously private areas of the infrastructure. Companies allow workers outside the premises to interact with data and processes through cloud adoption or more relaxed access policies, which may negatively impact business security and confidentiality.

We prepare for future cyber threats through several strategies. First is machine learning. The widespread adoption of machine learning has made it possible to detect new malware based on features seen in previous attacks. Next, bug bounty programs reward people for identifying or resolving bugs, creating a win-win situation for both the bug-finder and the organization that can now work on fixing the problem. Additionally, testing and security audits work by recruiting people to test the organization’s security system.

We spend increasing amounts of time online and document our lives through work and social apps. Networks like Instagram, Facebook, and Twitter are digital public spaces, while work apps like Slack, Zoom, and Google Docs help us work remotely.

With so much data posted online, we inevitably share personal details., ranging from the mundane to the confidential. However, it is not always clear what we should not post online: Addresses & Phone Numbers, Identification, Credit Cards, and Banking. So be mindful of what is said or shared in Digital Public Spaces.

 

+ There are no comments

Add yours