Archi's Academy

GetStarted

GetStarted
Get in touch

Cyber Security

Hey everyone, I am back with next part of the series.

A strong cybersecurity method has layers of protection to defend against cybercrime, including cyber-attacks that attempt to access, change, or destroy data; extort money from users or the organization, or aim to disrupt normal business operations.

Some of the countermeasures are:

Critical Infrastructure Security – keeps safe the computers, networks, and other assets that society relies upon for national security, economic health, and/or public safety. The National Institute of Standards and Technology (NIST) has created a cybersecurity framework to help organizations while the U.S. Department of Homeland Security (DHS) provides additional guidance.

Network Security - protects a computer network from intruders, including both wired and wireless (Wi-Fi) connections.

Application Security - helps to protect applications operating on-premises and in the cloud. Security should be built into applications at the design stage, with considerations for how data is handled, user authentication, etc.

Cloud Security- specifically, true confidential computing that encrypts cloud data at rest (in storage), in motion (as it travels to, from, and within the cloud), and in use (during processing) to support customer privacy, business requirements, and regulatory compliance standards.

Information Security - data protection measures, such as the General Data Protection Regulation or GDPR, that secure your most sensitive data from unauthorized access, exposure, or theft.

End-user Education - building security awareness across the organization to strengthen endpoint security. For example, users can be trained to delete suspicious email attachments, avoid using unknown USB devices, etc.

Disaster recovery/ business continuity planning - tools and procedures for responding to unplanned events, such as natural disasters, power outages, or cybersecurity incidents, with minimal disruption to key operations.

Some Cybersecurity points you should follow both at work and your home:

1. Always secure your Wi-Fi with a password and use WPA2.

2. Wise GPS and Bluetooth Usage, always keep them off on any device when not in use.

3. Select Strong Passwords. Do not keep the password on easy-to-fetch information about yourself. Educating good habits (password changes, 2-factor authentication, etc.) is an important part of cybersecurity.

4. Use Antivirus in your system. Do install one! These are not expensive. Do not forget to check whether the antivirus is running when you are installing something.

5. Avoid suspicious texts and mails. Delete texts and emails straight away if you do not recognize the sender.

6. Use Encryption and Firewalls which will help you regulate both inbound and outbound network traffic. Including encryption software will scramble the important data and will protect it even if it gets into the wrong hands until and unless the hacker knows the encryption key.

7. Keep your Mobile devices under your sight and never lose sight of your devices like tablets, laptops, or smartphones.

If you are thinking that you are safe and why do we need Cybersecurity and that only bigger organizations get into the trap of hackers or some malware thefts then you are completely wrong. A normal consumer, who is connected to the internet if not vigilant enough, can be trapped easily.

Because it is just a matter of minutes to hack an internet-connected device and that is why Cybersecurity matters. This device can be a laptop, desktop, smart television, smartphone, or smartwatch. Also, the importance of Cyber Security must be clear by now. Every smart device needs a smart user when connected to the internet!

Check out my previous blog in case if you missed.

That was all about threats in Cybersecurity Countermeasures, drop a like and share it if you found it informative.

Goodbye. Have a nice day, meet you in next blog!

archis-trainee

Krishna Prabha

Monday, Nov 15, 2021