Perils of Cyberworld: The Cause, Effect, and Cure of Cyber Security Breach

Table of Contents

Internet and digitization are a boon and a bane! Today, our lives revolves around the growing whims of the .com space. From entertainment to utility bills everything happens at our fingertips. The internet is a working tool/resource for any organization, it has empowered people to attain, manage or store data, using the cloud technology. But loopholes are omnipresent leading to a data breach or comprising information that could be confidential and personal. With sensitive data being transmitted through the internet organizations individuals have realized the importance of cyber security and firewall.

The cause & effect 

At first, let us understand what kind of threat looms around Cyberspace. The digital space is plagued by threatening viruses like Trojan, Spyware, Ransomware, Bugs to name a few. Additionally, there are phishing sites that are just as dangerous. Once the virus enters the system the data is compromised. You might lose out on important information varying from passwords to confidential documents and a lot more. Hasn’t just the thought of such an occurrence sent a chill down your spine? The question is, how did the malware enter the system? A visitation to suspicious or forbidden websites, clicking on spurious links sent via email or popups, or opening spam emails can affect your system. Cyber fraud/cyber crimes are common these days. We have all heard of how credit cards are swiped without actually swiping them. While organizations have the expertise to build secure systems, Individuals have always been vulnerable targets of such cybercrimes. The rise of cybercrimes augmented during the pandemic. Apart from data loss, we have witnessed even more heinous crimes like cyber molestation and rape that was attempted on minors. The adverse effects of these crimes have a devastating impact on people.

The cure 

Being ALERT is the mantra! Be it an individual or organization should be well-read and aware about cybercrimes and malware that can cause damage. Primarily they should identify the risks that one can attract. Risks like malwares, misplaced passwords or info, system flaws or weak software systems with loopholes. To avoid these mistakes what does one do? Start with the basics.

Usage of passwords:One must incorporate the use of strong passwords. This  should comprise of a combination of numerics, alphanumerics special characters and numbers. Avoid the use of personal data and keep changing your password frequently. Creating a password policy is the best practice, especially when it comes to organisations. Scheduling mandatory password change is the key.

Restricted Access: The best way to control or avoid damage is giving access to only authorized personnel. This isn’t only relegated to controlling access to systems but also to the specific area. Limit access to network or servers through application controls. Restrict the use of external devices like pen-drives and hard disks. Avoid uploading and downloading attachments.

Firewall: Firewall acts as a guard restricting access to certain websites that should not be accessed by employees in the office premises.

Security Software: Ensure that the systems are equipped with anti-spyware/malware and anti-virus programs that detects and prevents malware or spam content.

Monitor: Set up a team that will monitor and identify suspicious network activity and flag it off on time to ensure damage control.

Raise awareness: Keeping employees abreast of the do’s and don’t’s while using internet at workplace. As the saying goes “Better safe than sorry”, it is important to be vigilant and aware about cyber security. Though Cyber security is a very diverse topic. This article encapsulates the overarching view on the concern and methods to handle it.

Explore CompTIA Security+ (SY0-601) with EduBridge

Recent Blogs


    Explore our Courses