Casestudy Lee

Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

Brief Study on Cyber Crimes

https://www.researchgate.net/profile/Dhaval-
Chudasama/publication/352121472_Brief_Study_of_Cybercrime_on_an_Internet/links/60ba108
2a6fdcc22ead4cbe2/Brief-Study-of-Cybercrime-on-an-Internet.pdf

Rapid technological growth and developments have provided new opportunity and productive
sources for organizations of all sizes. Technological growth is majorly braced by the internet and
new technologies have brought threats and cybercrime continues to evolve with new threats. It’s
an effective idea to know how to recognize cybercrime to help protect yourself from attack and
how to protect your data. Hackers are turning to Internet-based social networking sites for
exploitation. Today anyone can send and receive any form of data, be it an e-mail, audio or video
by just clicking the button. The Internet is the fastestgrowing infrastructure in everyday life and
the latest technologies are changing the face of mankind. But due to these emerging technologies,
we are unable to safeguard our private information. and hence these days’ cybercrimes are
increasing day by day. Today more than 60 per cent of commercial transactions are done online
and this needs high security. The scope of cybersecurity is not limited to securing the
information in the IT industry but also to various other fields like cyberspace. Even the latest
technologies like cloud computing, mobile computing, E-commerce, net banking etc also need a
high level of security as it holds some important information regarding a person whose security
has become a must thing. Improving cybersecurity and protecting information is important to
each nation’s safety and economic wellbeing. Making the Internet safer has become crucial to
the development of new services as well as governmental policy. The battle against cybercrime
needs an extensive and safer approach. Given that technical measures alone cannot prevent any
crime, law enforcement agencies must be allowed to investigate and charge cybercrime
effectively. Today many nations and governments are imposing strict laws to prevent the loss.
Every individual must also be trained in cybersecurity. Technology has influenced everything
from governments and market economies to global trade, travel, and communications. There are
many benefits of the online world and cons too. In a study, 30 economies including the United
Kingdom, United States of America (US), and Australia, it was the citizens that spent the most
time online—at eight hours fifty-nine minutes, per day—across PC and mobile devices. Brazil at
second with eight hours, trailed by Thailand at eight hours 49 minutes. A major reason for this
increased Internet usage is social media, and particularly individuals use platforms such as
Facebook, Instagram, WhatsApp, YouTube, Twitter and instant messaging services. Internet
crime is the most active and strong sector of cybercrime. Identity theft, Internet scams and
cyberstalking are the major types of Internet crime

Protecting Ourselves from Digital Crimes


https://www.researchgate.net/profile/Dhaval-
Chudasama/publication/352507646_Protecting_Ourselves_from_Digital_Crimes/links/60cc3455
a6fdcc01d47df059/Protecting-Ourselves-from-Digital-Crimes.pdf
INTRODUCTION

“Ever since men began to change their lives by using technology they need found
themselves during a series of technological traps”. One of the most effective examples for
technological trap is cyber crime. Cyber crime also referred as computer crimes, electronic
crimes or e crimes. “Cyber “is brief for “cyber space”. The electronic medium of network. In
which online communication takes place. “Cyber crime is considered computer-mediated
activities which are either illegal or considered illicit by certain parties and which may be
conducted through global electronic networks. Cybercrimes describe criminal activity within
which the pc or network could be a necessary part of the crime”. Cyber crime was broken into
two categories and defined thus [1–3]

1. Cybercrime in a very narrow sense (computer crime): Any illegal behavior directed by
means of electronic operations that targets the protection of computer systems and the data
processed by them.

2. Cybercrime in an exceedingly broader sense (computer-related crime): Any illegal


behavior committed by means of, or in reference to, an ADPS or network, including such
crimes as criminal possession and offering or distributing information by means of a system or
network.

Origin of Cyber Crime


It is believed the primary recorded cyber crime passed off in the year 1820.This can be true
with the actual fact that, computer did exist since 3500 BC in India, China and Japan. The
modern computer began with the analytical engine of Charles Babbage [4, 5] Different
types of cyber crimes prevalent today are given in Table 1).
Cyber Security
A crime like spamming, passing on computer viruses, harassment, cyber stalking, et al
became common in our contemporary world. While these issues don't carry potential monetary
loss, they're even as harmful in the possibility of losing files, information and access to your
computer. This is often why Cyber Security is required. Cyber security means protecting
information, equipment, devices, computer, computer resources, communication device and
knowledge stored therein from unauthorized access, use, disclosure disruption, modification or
destruction [4, 5] Preventive measures to curb cyber crimes.

Why Cyber Security?


Computer security is vital because it can provide the opportunity for the users to shield
their important information present on the network and also within the system (right to privacy).
It also helps in defending the pc system against different types of destructive technologies and
protects the PC from damage (viruses, worms, bugs and bacteria). It also helps in monitoring
the network and protects it also from different threats. So, we should always use computer
security solution on some level to shield our data from different style of sniffing stolen problem.
In general, Computer Security is significant for shielding the confidentiality, integrity, and
availability of computer systems, resources, and data.
10 Crucial Cyber Security Tips for Small Businesses in 2022

Global Security Mag Online. (n.d.). 10 Crucial Cyber Security Tips for Small Businesses in 2022 – Global
Security Mag Online. https://www.globalsecuritymag.com/10-Crucial-Cyber-Security-Tips-
for,20220223,122355.html?fbclid=IwAR0LcD45bwXv9emtHnCqyAwXH8eKfV_twx29Hw6ebWWQED85N
1eUmevTGH4_aem_AbnvU_CEBtWOVcs7GexYHe7b9hoL0OLLxFqkVLW-
N1X7HsUmphBD0LnwDL_ETG7MfiDb0NEyeIK9wnZn9kEFbuTI

Being hacked can result in your customers’ and employees’ sensitive information being stolen, as well as your business
losing money.

We see new businesses forgetting about cyber security all the time. They are so focused on getting the most for their
money when it comes to technology that they don’t take the time to make sure it is safe to use.

We understand that many people start new businesses on a shoestring budget and that cyber security has a reputation
for being expensive and needing an IT department to handle all the extra work it causes.

But it doesn’t have to be this way, especially if your business is on the smaller side. There is a series of low-cost changes
you can make to how you run your business that will help to keep your employees, customers, and finances safe online.

Making sure that your business is safe against cyberattacks is not a quick process – but it is worth every second when you
think about the alternatives. It is not an activity that you can cut corners on, but again, it is more than worth all the effort.

The earlier you can get your cyber security system in place, the easier it will be to keep your business safe. On the other
hand, it is never too late to get started and sure up your cyber security.

So, no matter how old your business is, you will find a lot of useful information in this article.

Why Is It Important To Have Cyber Security For Your Business?

According to the FBI, 10,000 small businesses across America are targeted by hackers every day. This may be because
they have not set up their security properly or because the hackers are trying to use them as a back door to get into other,
bigger businesses.

Let’s look at why this can be dangerous for you.


Protection Of Sensitive Information

As a business, you will most likely be storing sensitive information about your customers and your employees. Hackers
can get hold of this information and sell it or use it against the victims.

You also risk breaking data protection and GDPR rules if hacked. These can result in big fines for you and your business.
Potential Money Loss

86% of hacks on small businesses were financially motivated in 2020. The hackers may be looking for banking
information (of your business or your customers) to steal money that way.

Or they may install malware and demand a ransom. They target small businesses with this technique because it is often
cheaper for small businesses to pay the ransom than deal with the consequences of not doing so.

If you are only making a small amount of profit then paying a ransom like this could push you into administration or into
debt.
Top 10 Cyber Security Tips For Your Business
Top 10 Cyber Security Tips For Your Business
Now that you understand why it is important to protect your business from cyberattacks, let’s look at how you can do this
in a way that doesn’t break the bank.

All of the tips that we will mention in this section are low cost and designed with small businesses in mind. We want you
to be able to protect yourself without having to spend a lot of money.

Here are 10 tips to improve the cyber security levels of your business.

Keep Software Up To Date

Let’s start with the point that is easiest to act on but gets overlooked so frequently.

You need to make sure that all desktops, laptops, tablets, phones, and other devices owned by your company are kept up
to date. You also need to make sure that you keep track of the software and any security flaws in them that might have
been exposed.

We know that this sounds incredibly simple, but you would be surprised by how many people don’t update their
computers because they think it is a waste of time. They keep pushing the “remind me later” button until they have a
queue of half a dozen updates that need to be downloaded.

Why is it important to keep the software on your devices up to date?

Well, there are many devices that won’t run unless they are completely updated – this is a trick that companies use to
make sure that people update regularly.

It is also worth noting that the majority of updates that Windows and IOS ask us to install are actually patches on the
security system. When the teams of these companies notice a flaw in their work or become aware of a new security threat
– they create an update that will solve the problem.

Not updating the software leaves you exposed to any of these issues.

So, what can you do as a business owner to make sure that all of your devices are fully up to date?

For devices that are used in a store, or in-house, that multiple people have access to, we recommend that you set aside
one evening a week to do a technology audit and make sure that everything is as up to date as possible.

When it comes to individual computers or laptops, we recommend that you set up some kind of chain of accountability, so
that people must report to a supervisor that they have updated whenever a new update is released.

Alternatively, you may want to turn on automatic updates on all company devices.

Pick A VPN

VPNs are Virtual Private Networks. VPNs are a great tool for small businesses that cannot afford their own internal
network or for team members who work from home.

VPNs are important for employees to use at home because their cyber security is likely to be weaker there than it is in any
of your office buildings. An employee trying to access sensitive or important information from a larger network can create
a weakness in the security of the whole company.

You should also make sure that anyone who is accessing your company network or anything work-related via public wifi
uses a VPN – more on this later.

So, how do you implement the usage of VPNs throughout your business?
You should start by choosing one brand of VPN that you want your employees to use. You should try to avoid free
software and VPNs where possible. They will make the risk of being hacked greater.

There are many affordable VPN options out there and many that will offer a small business discount or multiple license
discount.

Then have everyone in the company install the VPNs. They can then turn the VPN on whenever they need to access
sensitive information. (most of them also have browser extensions to make the process even easier).

We will talk about firewalls in the next section, but it is worth looking into whether your firewall protection comes with a
built-in VPN that you can turn on and increase your security across the whole network.

This is an easy and inexpensive way to beef up your business’s cyber security.
Hacker hacking

Human Firewall Tactics

90% of malware attacks come from a phishing attempt and 47% of cyber security breaches happen because of employee
negligence. One of the best things you can do to decrease the chances of you being hacked is to make sure that all your
employees are IT-literate.

Where should you start with this kind of training and does everyone need to go through it?

We recommend that all of your employees go through the name cyber security training so that you are 100% sure that
everyone has the right base knowledge to keep the company safe.

Start by talking through the dangers of Phishing – this is something that you may have to learn about yourself too. Make
sure that they are aware of little details like the fact that it is possible to change the destination of a hyperlink without
changing its appearance.

That link looks like it should lead you straight to Google.com, however, if you click on it, it will take you to a picture of a
cute dog. You can avoid nastier versions of tricks like this by hovering over a link, this will show you the real destination
of the link.

You should also talk to your staff members about not opening emails from addresses they don’t recognize and be aware
of suspicious messages or links that they are sent from within the company.

A small amount of vigilance from your team members can make a huge difference.

Some scammers will also try to get passwords or other important pieces of information over the phone. Remind your
employees that banks, electric companies, and other third-party services that you use should never ask for personal
information or the companies bank details.

If they are suspicious of a phone call then they should hang up or pass the caller on to someone more senior in the
company.
Anti-Virus Protection And Firewall
Anti-virus

There are two pieces of software that are essential to keeping your business safe from cyberattacks and if your business
does not have either of these stop reading and sort that out right now.

We are, of course talking about anti-virus software (AVS) and firewalls.

Anti-virus software is designed to detect and neutralize any threats to your business network, computer systems, or
devices.
According to Alan Herny, “modern anti-virus software can protect users from malicious browser helper objects (BHOs),
browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraud tools,
adware, and spyware.”

Anti-virus software does come at a cost, but it is a relatively small cost compared to the value they can offer you.

It is important that you install anti-virus software in combination with a firewall, as this will offer you the most complete
protection against malicious software and cyber attacks. Anti-virus software protects the hardware, while the firewall
protects the network that the hardware is running on.

The word firewall was first used to refer to computing software in a 1980s film about hackers.

Now, the word firewall refers to a security network that works within a company (or home) network that monitors
incoming and outgoing network traffic. The firewall blocks any suspicious traffic and can establish a barrier between
anything it thinks is trying to attack your computer.

Once you have installed anti-virus software and a firewall, it is important to make sure that you have adjusted the settings
to what the manufacturer recommends. This can be done individually on each computer or in one go using the network
settings.

It is recommended that you keep track of the software provider’s recommendations for the settings, as these may change
when new breaches and dangers are discovered.

You will have to purchase firewall software for your network, but again, the protection it provides makes it more than
worth it.

Update Security And Technology Training Protocols

In an earlier section, we talked about making sure that all your staff members are trained in basic cyber security skills –
such as knowing how to avoid a phishing scam – we also recommend that you make your cyber security protocol and
practices as airtight as possible.

As well as, training your staff members in the subject as much as you can.

You should establish a cyber security protocol for your organization as soon as possible. This protocol will make sure that
everyone uses their machines safely and knows exactly what is expected of them. This will also have the information to
refer back to if they ever need it.

If you don’t know where to start when creating your company’s cyber security plan and protocol, then start with the other
9 items on this list. Spell them out in a way that makes them clear and easy to follow. Try to include videos or
screenshots of each action point.

You should make sure that every new starter in your business is aware of this protocol and assign the responsibility of
checking this to a staff member who has a good comprehension of how computers work.

You should also make sure that you have a robust cyber security training program that you put all your staff members
through. They should do this when they first start and they should have to do a refresher course at least twice a year.

You can either create this course yourself if you are confident that you understand the topic and can teach it to others. Or,
you can bring in a cybersecurity consultant to help you create the course and maybe even teach it themselves.

This may seem like you are spending more money and time than you would like to – but as with every other tip on this
list, implementing it is helping to protect yourself from hackers and cyberattacks – which is invaluable.
Use Two Or Multi-factor Authentication For Logins And Approvals
One of the easiest ways to protect your most important accounts from hacking is to use two or multi-factor authentication
when logging on. For particularly important accounts, you may want to insist on managerial approval to be able to access
that account.

What is multi-factor authentication and how can it help to protect your important accounts?

Multi-factor authentication is a login process where after entering a password a second, one-time passcode is sent to
another device allows access. It may be sent via email or text message.

For example, if you are trying to log on to your work email account, you would have to enter your password, you would
then relieve a text to your work phone with a 6 digit one-time passcode. You would enter this code and be allowed into
the account.

Multi-factor authentication is really useful as it prevents remote access to your accounts – the hacker must be able to
access your password and your texts to get into the account.

It is important that you choose an appropriate email account or device as your second layer of authentication. It cannot
have the same access code as the account you are trying to access and it should ideally be something only you have
access to.

This is why phones make such a great option for two-factor authentication. It is a lot harder to hack a phone than it is to
hack a second email account.

You may also be interested in protecting your most important accounts with passwords or codes that only management in
the business knows. For example, lots of shops only allow managers to remove money from their tills and they need a
managerial code to be able to do this.

If you have important accounts that are protecting sensitive information then you should consider only giving access to
the people who really need it.
Protecting Personal Identifiable Information (PII)

Personal Identifiable Information (PII) is the technical term for any type of information that hackers can use to work out
where you are or even who you are.

Personal Identifiable Information can be both physical and digital – it includes but is not limited to name, address, phone
numbers, date of birth, Social Security Number, IP address, and your location details.

PII can be acquired through phishing activities, by hacking your account (personal accounts as well as work accounts),
and even by going through your business’ bins.

This is another area of internet security that it is important to talk to your employees about, as people may be sharing this
information without realizing it.

For example, many of us post when our birthdays are on our public social media accounts, we also share names of our
children, pets, heroes, and close friends. Hackers can use this kind of information to get into your accounts if you are not
careful.

Many people do not realize that information that they share on their personal social media accounts can weaken the
security of their work accounts and put their whole business in danger.

Another thing you should be wary of is using key dates in your business’ history as passcodes. We once worked for a
company that used their founding date as their safe code, and they would tweet about their anniversary every year. That
was a huge security flaw.

Part of your company’s cyber security protocol should include making sure all employees check their security settings on
all of their social media accounts – to check that they are not sharing any PII that could be used against them.
Not only should you be concerned about protecting your own Personal Identifiable Information, but as a business, it is
your responsibility to protect your customers’ PII as well. They have the right to know that their information is protected
thanks to the PCI DSS standards.
Do Not Use Public Wifi

We mentioned above that you should not allow your employees to access anything on your work network while using
public wifi without using a VPN.

If we were you, then we would take this a step further and insist that no access the work network or accounts at all while
using a public wifi network.

Public wifi networks are a hacker’s playground and are incredibly dangerous, even for highly protected devices. They
really should only be used as a last resort, but they are best avoided altogether.

When we say public wifi networks, we include wifi networks on public transport, at airports, at cafes, and even in
communal working spaces. If you and your business has no control over the network or do not know what kind of
firewalls they are using – you do not want to risk it.

If your employees work on the go a lot then you would be better off investing in a portable 4G hotspot for them.

Backup Your Data Regularly

One of the things that makes ransomware so effective is that a lot of people and small businesses do not back up their
data regularly enough.

Most ransomware attacks involve locking you out of your computer, phone, or device and refusing to let you back in
unless you hand over a considerable amount of money. If you haven’t backed up your data, then paying the ransom is the
only chance you will have to get your data back.

Some hackers may give you access to your data again, however, it is not unknown for hackers to leave devices locked
after they have gotten their money.

If you backup your data online, on the cloud, or physically in a separate location then you will be able to wipe your
computer to remove the ransomware and then download all of your data again.

This will save you from having to pay any money to hackers. You are also more likely to be able to get your business up
and running again more quickly this way.

When you are backing up your data it is important that you don’t just back it up on your computer – you either need to
back it up online as well or on an external device that is not connected to the internet.

How frequently should you back up your computer and how can you make sure that it is done regularly?

Depending on what kind of business you run and how busy it is, you may need all staff members to back their computers
up at least once a day. Although, most businesses may be able to get away with backing up once a week and situationally
after any important work has been done.

To make sure that everyone is backing up when they should be make it part of their daily checklist and have someone
who is responsible for checking up on this.
Use Strong Passwords And A Password Management Tool

Strong passwords

In 2022, we are all aware of the importance of using strong passwords and not repeating passwords across multiple
accounts. We all do this in our personal lives, so why would we act any differently at work?
A strong password is the first line of defense against hackers and it should not be overlooked, even when you are
employing every other tip on this list. So, make sure that all your employees are creating strong passwords:

The password should have more than 8 characters


It should include at least one number and one symbol
It should include one capital letter
It should not include a birthday or anniversary date
Ideally, passwords should be a string of random words and letters – here is a random password generator that can be
used to create those.

You should employ all of these techniques when creating passwords for shared accounts. You should make sure that
passwords are being refreshed at least once every 6 months.

When it comes to password management, you should avoid having a document with all of the company’s important
passwords written in it. Especially, if this is done on software that can also be hacked.

When you are sharing passwords between different members of the business, it is best that you share these passwords
verbally, rather than emailing them to each other or having them written down somewhere.

If you must share them using a messaging system, we recommend texting them – as phones are a lot harder to hack
than emails.

Things To Consider

Above are the 10 easiest ways to sure up your cyber security. Before we leave you, we want to give you three more
advanced tips that will help you to take your cyber security to the next level.

Acting on these tips will be a little bit more difficult and expensive than the tips above, however, in the long run, they will
be worth it for your business.
Secure Your Mobile Device

Many of us are walking around with unprotected phones that are full of sensitive information about ourselves and our
businesses.

While some of the high-end phones come with end-to-end encryption and malware protection, not all phones do. And a
lot of people don’t realize this.

You can protect people’s work phones by making sure they only download company-approved apps, that they use
complex pin codes, and that they do not save passwords to their phone.
Encryption Software

Encryption software is a more expensive but effective solution to the problem of cyber security.

Encryption software will make sure that even if someone does hack into your business’ network, they won’t be able to
read or get access to any of your files.

We recommend that you encrypt everything your business works on. It may add a little more time to your day having to
decrypt and then re-encrypt everything you use – but if you were to be hacked it would keep your sensitive data out of
the wrong hands. There are many options when it comes to encryption software – it is important that you choose
software from a reliable company and you download the software from an official source.
Don’t Mix Work and Pleasure.

Finally, make sure that everyone who works for you has a separate work computer – even if they work from home.Make
sure that they use these devices for work and nothing else. This will make you less vulnerable.Protecting your business
from cyberattacks and threats is one of the most important things you can do as a business owner. It is your responsibility
to keep your business and your staff members safe.
4 Steps on How to Stay Safe Online
Johnson, A. (2024, February 8). ‘It’s easy to stay safe online’ with these 4 steps
(plus 1). Norton. https://uk.norton.com/blog/how-to/its-easy-to-stay-safe-
online?fbclid=IwAR1awq44dDnOUX-GEDx-
bL28QrD4qKBX6EMGbFdCCoXpXuy_tYfSuhpAazQ_aem_Aeoka-W2sJTv0VKHg-
KDcplox5H3gxpJ4vXNGsiVrnyn6VMEuQ5cNzrI8LH6NJwB2Py6p1I4o1qw2Genf9Z5QBb
y

It's that time of year again: the time to think about the importance of cybersecurity and take some
simple, easy steps to protect yourself and your family.

October is Cyber Security Awareness Month, an annual event held every October with the aim of
raising awareness about the importance of online safety. Although it originated in the United States,
the initiative is recognised by many countries around the globe.

With that in mind, here are four essential steps to take, plus a bonus task, to help you protect yourself
from identity threats this year.

1. Turn on multi-factor authentication

One of the quickest and easiest ways to stay safer online: enable multi-factor authentication on your
accounts. This simple step takes just a few minutes per account, and you only have to do it once. As
soon as it's in place, it becomes twice as tough for hackers to gain access to your accounts.

What is multi-factor authentication (MFA)? Also known as two-factor authentication, this widely
available tool secures your accounts by requiring two pieces of information to log in. One common
example of two-factor authentication: entering your password and then typing in a one-time code sent
to your email address or smartphone.
Other examples of a second step that may be used in two-factor authentication or 2FA include:

 A security question (for example, "What was the name of your first pet?")
 A biometric identifier such as your face or fingerprint.
 A temporary passcode you get via an authenticator application.

You can typically enable multi-factor authentication by going to an account, going to settings and
looking under security. You then toggle multi-factor authentication to "on" and provide any necessary
information, such as your phone number or email address where you want a code sent. For example,
here’s how to turn on 2FA on Facebook and on Google.

Quick "It's easy to stay safe online" task

Take 20 minutes to set up 2FA on your most important accounts. Consider doing this for: your online
banking, email, house bills, online shopping and social media accounts. Here's a handy list to help
you stay safe online.

2. Shore up your password practices

Another top priority for online safety: Use strong passwords and a password manager. If you can
easily remember a password, chances are good that a hacker could use a computer program to quickly
guess it and get the keys to your online kingdom.

A strong password should be:

 Complex – with upper and lowercase letters, numbers, and symbols


 Long – at least 16 characters long to make it much harder to figure out
 Hard to guess – no real words or personal details like names and birthdays

But the same characteristics that make passwords hard to figure out can also make them difficult to
remember. That's why password managers are such a handy tool.

Password managers keep track of your passwords in a private online vault, can generate strong
passwords for you on demand, and can even safeguard other important information such as your debit
or credit card numbers. They can quickly and easily auto-fill your passwords for you when you log
into a site.

Examples of popular password managers include Norton Password Manager. You can get a free or
paid password manager service depending on your needs, number of devices you have, and the
features you need.

Quick "It's easy to stay safe online" task

If you don't have one, take 10 minutes to start using a reputable password manager. To sign up,
choose your password manager, register for an account, and choose a master password. Hint: Make
your master password very long and difficult to guess. And make sure to keep it in a secure place.
Your master password will give you access to your password manager but could also be used by a
cybercriminal to get a hold of all your passwords if you don't keep it safe.
3. Update your software right away

Keeping your software up to date is one of the easiest and most important things you can do to stay
safer online. That's because software updates often fix bugs or loopholes attackers can exploit to gain
access to your data, infect your device with malware or ransomware, and even remotely take over
your computer.

Make sure to update your software on a regular schedule or whenever you get an alert letting you
know an update is available. Get in the habit of doing software updates right away rather than putting
them off for later. It's also smart to get a reputable security programme that can add an extra layer of
protection.

Want to brush up on how to perform regular updates? Here's how to update the software on an
Android and how to update the software on an iPhone or iPad. It's important to regularly update
your operating system as well as apps on your device. Not only will regular updates help keep you
safe online and shore up your privacy, they'll also fix glitches and help your devices run more
smoothly.

Quick "It's easy to stay safe online" task

Take 15 minutes to check your devices for software updates and get current. For convenience and
speed, turn on automatic software updates. If you prefer to update software manually, set up an alert to
remind you to check for updates once a month.
4. Spot and report phishing scams

Learning to recognise and report phishing scams is a crucial step you can take to ensure your online
safety. Thankfully, it's quite straightforward to do and doesn't require much time at all.

What is a phishing scam? It's when a cybercriminal sends you a fake email, direct message, text, or
even a pop-up ad to try to trick you into taking an action such as clicking a link, providing personal
information, or making a payment. A phishing message may be cleverly disguised to look like a real
message from a familiar company such as your bank.

Cybercriminals can be quite sophisticated when it comes to phishing scams, to the point that there are
many types of phishing techniques that have earned their own names. For example, "spear phishing"
targets a specific individual rather than a group, and "whaling" targets a big fish like the CEO of a
company.

Learning to spot the telltale signs of phishing and to stop and think before acting on an email or other
message can go a long way towards keeping you safe from phishing scams. Here are some clues that
could alert you to a phishing scam:

 Alarming "news" about an account.


 Attachments that look odd.
 Failure to address you by name.
 Grammar errors or misspellings.
 Offers for free gadgets, trips, or other items of value.
 Language that sounds a bit "off."
 Request to click a link or take urgent action.
Quick "It's easy to stay safe online" task

Take 10 minutes to review these real life examples of phishing messages that were sent through
email and social media. And make a quick note of what to do if you receive a suspected phishing
message: Don't click on links or open attachments, report phishing to your email provider, delete the
message and block the sender. As an example, here's how to report phishing in Gmail if they're
your provider.

5. Protect your identity and privacy

It's not uncommon in the UK to become a victim of identity theft, and sorting it out afterwards can be
a real hassle. What is easy, however, is taking steps to protect your identity and privacy.

The good news: some of the items we've already covered, such as security software, strong passwords,
two-factor authentication, and regular software updates, can help protect against identity threats. To
learn what else you can do, take a look at these common signs that your identity has been stolen and
how you can avoid it happening to you.

Quick "It's easy to stay safe online" task

Take 15 minutes to complete these three simple steps to better safeguard your identity. Make sure
your mobile device is locked with a strong passcode to keep identity thieves from adding spyware
when you're not looking. If you don't own a shredder for sensitive documents, take a minute to
research models or make a note of the dates of free shredding events in your local community. And set
up an alert to remind you to check your credit reports at any of the three main credit reference
agencies in the UK; Equifax, Experian, and TransUnion.
As you can see, it really is quick and easy to enhance your cybersecurity. You can do these four key
steps in an hour or less — and many only need to be done once. Taking the time to do these tasks this
month will greatly improve your security and give you peace of mind.
TheImpacts of Cybersecurity In Public and Private Sectors
Rosman, M. R. M., Arshad, I. H., Abdullah, N., Aziz, N. E. A., Osman, G., Shukry, A. I. M.,
Alias, N. R., Rosli, N. N. I. N., Fadzil, F. H., Saleh, M. S. M., Zawawi, M. Z. M., &
Rachmawati, M. (2023, August 1). Proceedings of 1st Glocal Symposium on Information and
Social Sciences (GSISS) 2023. Zenodo (CERN European Organization for Nuclear Research).
https://doi.org/10.5281/zenodo.8201436

1. INTRODUCTION Newspaper articles, academic papers, security-related conference


proceedings, and many other studies make it evident that cyberspace, and particularly
cybersecurity, is a subject that is currently attracting considerable interest and attention from
a wide range of stakeholders. The objective of this paper is to give knowledge to all private
and public sectors about the importance of cybersecurity care and to spread awareness about
cybersecurity among all private and public sectors. Month by month, the significance and
importance of this subject grow, along with the implications and impact that it has. From the
average person using their online banking account to the boards of directors (BoDs) of
corporations, stakeholders span the entire spectrum. These boards are becoming increasingly
aware that safeguarding their respective companies in cyberspace is a clear corporate
governance obligation, and as a result, they are responsible for the related cyber risks in their
organisations and the ensuing legal repercussions for any potential negligence or ignorance.
However, because of these worries about cyber-related risks, a lot of people including
security solution providers looking to market their products—have turned the term
"cybersecurity" into a buzzword because of the problem such as lack of knowledge from
public and private sectors about importance of cybersecurity care and lack of awareness
about cybersecurity in public and private sectors. In doing so, they often capitalise on the
"cyber fears" of users and executive management by using it as an umbrella term for all
security-related concepts. Depending on the circumstance, various definitions and
explanations of cybersecurity are given, and phrases like the following are frequently used in
connection with the cyber field. Cybersecurity is the area of information security that focuses
on safeguarding the availability, confidentiality, and integrity (CIA) of digital information
assets from dangers that could result from those assets being compromised online.
Information security includes cybersecurity. Cybersecurity is concerned with safeguarding
the CIA's digital information assets against threats and attacks that in some way include the
internet, which serves as the primary application domain for cybersecurity. This illustration
may help further clarify the meaning. Let's say a worker sells a USB drive to an unauthorised
person after copying private company data onto it. Information security has undoubtedly
been compromised, but cybersecurity has not occurred because the internet is not involved.
However, if an employee uploads data from within the organisation to a cloud-based storage
system (over the internet) and the unauthorised party is given access to this cloud storage,
then this becomes a cybersecurity and information security breach. The cybersecurity
environment includes high-profile data breaches, hacks, and cyberattacks. Attacks on
computers and information networks, both public and private, are disclosed in the news daily.
Most recently, Apple, Facebook, and Twitter acknowledged that they were attacked and were
now taking additional measures to secure their networks. As a result, both the public and
private sectors now view cybersecurity as a top issue. Cybersecurity is becoming
increasingly crucial due to the increased reliance on computer systems, the Internet, and
wireless network technologies like Bluetooth and Wi-Fi, as well as the expansion of smart
gadgets and the myriad devices that make up the "Internet of Things." Cybersecurity is one
of the biggest problems in the modern world because of its complexity in terms of politics
and technology. Cybersecurity began in the 1970s when researcher Bob Thomas developed
the computer programme Creeper, which marked its path by leaving a breadcrumb trail as it
moved throughout the ARPANET network. The programme Reaper was created by email's
creator, Ray Tomlinson, and it chased and removed Creeper. Reaper, the first computer
worm ever, was also the first instance of antivirus software and the first self-replicating
application. Commercial antivirus initially appeared in 1987, despite conflicting claims over
who invented the first antivirus product. In 1987, Andreas Lüning and Kai Figge launched
Ultimate Virus Killer, their first antivirus programme for the Atari ST. The original version
of the NOD antivirus was developed by three Czechoslovaks in the same year that John
McAfee launched McAfee in the US and made VirusScan available. More people started
posting their personal information online as the internet became more widely used. As a
possible source of income, organised crime groups began stealing data from citizens and
governments online. By the middle of the 1990s, network security threats had grown
tremendously, necessitating the mass production of firewalls and antivirus software to
safeguard users. Beginning in the early 2000s, organised crime groups began to heavily
invest in funding professional cyberattacks, while governments started to crack down on the
illegality of hacking by handing out increasingly harsher punishments to those responsible.
Sadly, viruses also grew in number as the internet expanded, despite the fact that information
security continued to progress. The cybersecurity market is still expanding at a breakneck
pace. According to Statista, the size of the worldwide cybersecurity market is expected to
increase to $345.4 billion by 2026. One of the most frequent dangers to the data security of
any company is ransomware, and its prevalence is expected to rise. Proceedings of Glocal
Symposium on Information and Social. Cybercrime is on the rise as a result of more
advanced technology (Soumyo, 2004; Sabillon, 2016; Kennedy et al., 2019; Chandra and
Snowe, 2020; Buil-Gil et al., 2021), and it has a daily impact on international trade (Zheng
and Albert, 2019; Hassija et al., 2020). In order to reduce the risks associated with it,
governments, organisations, and companies of all sizes must prioritise protections against it
(Bambauer, 2014; Brookson et al., 2016; Pandey et al., 2019; Simon and Omar, 2019; Li and
Xu, 2021). Cybercrime is a more comprehensive term defined as "illegal acts that target or
use computers, computer networks, or networked devices" (Dashora, 2011; Choo et al.,
2021). Cyberattacks, a subset of cybercrime, are more targeted and refer to specific attacks
performed using new technology. They are an intentional and hostile attempt by a person or
organisation to access another person's or organisation's information system. According to
Lindsay (2015) and the Cisco Annual Cybersecurity Report (2020), 53% of hacks result in
damages and other negative repercussions totaling more than US$500,000. Technology is
used in cybersecurity to safeguard data (Darko and Boris, 2017; Colajanni et al., 2018; Li and
Xu, 2021). Cyberattacks continue to garner a lot of attention globally. A Google search for
"cyberattacks" in July 2021 produced 19 million results. The author, citing Fosso Wamba et
al. (2018), describes a rise in interest in the subject, which is shown by Google Trends, which
lists Singapore, the United States, Canada, the United Arab Emirates, and the Philippines as
the top five nations with more interest in the issue between 2010 and 2021. In recent years, a
number of researchers have concentrated on cyberattacks. Urquhart and McAuley (2018)
focused on the security of industrial objects from internet threats, whereas Ariffin (2021)
concentrated on cyberattacks leveraging internet access. Levy (2021) discussed how
cyberattacks are concentrating on people or small businesses that are components of larger
businesses. There is increasing pressure on organisations to protect the security of their
intellectual property as a result of the introduction of revolutionary technologies like artificial
intelligence, machine learning, cloud computing, big data, and IoT. Cyberattacks and data
breaches are reported almost daily, so organisations are under more pressure than ever to
ensure the security of their intellectual property. The actions taken by an organization's staff
to avoid or reduce information security incidents determine how effectively it can manage
intellectual capital. Though it is not an easy task, creating a strong cybersecurity defence.
Every employee has a responsibility to do their part in protecting the company because
people are the weakest link in a cybersecurity chain, so they need to be provided with the
necessary security training and resources.

You might also like