Being Cyber Secure is a Way of Life, at Work and at Home

Photo by Dan Nelson on Unsplash

They say the only constant is change. We all face this challenge in a world that has made technological leaps and bounds shifting from a physical landscape to a digital one. News headlines continually reinforce the fact that in this digital world, none of us are immune to cyber risks. And for each of us, it’s not “if” — it’s a question of “when.”

Cybersecurity requires constant awareness and vigilance, at work and at home. This includes in the office, visits to suppliers, shopping and playing games online at home, or engaging in any other connected interaction.

In recent years, Cyber-attacks have intensified and not only are large businesses targeted, but anyone else in the online environment is at risk.

Photo by Arget on Unsplash

A recent study found that, Hackers create and deploy over 300 000 new malware programs every single day on networks, individual computers, servers and other devices. And there are nearly half a million ransomware/malware attacks every year!

Malware threats come in a number of forms, including spyware, viruses, worms, bots, and trojans. Whereas Ransomware is a unique scenario where people hold your computer or system for ransom.

Even healthcare industry is not spared in these widespread attacks. Over the Past Years, 75% of the healthcare industry has been infected with malware. It is becoming more common for hospitals to experience ransomware attacks.

Photo by Dan Nelson on Unsplash

Similarly, most small businesses think because they’re not a famous or recognizable brand, that they’re not an aim for malicious hackers. In reality, the opposite is true. SMB’s typically have a smaller IT department and budget thus making them an easier target. Let’s consider the volume of data small businesses accumulate on a daily basis. Doctors, lawyers, real estate and financial institutions all keep large amounts of individual identifiable information (social security numbers, bank account information) that could be valuable to any hacker.

Cyber security professionals recommend, for every online business to take all the possible security measures: from securing email addresses, with strong passwords, to installing an SSL certificate for secure connection, hosting service that ensures server security, use of an antivirus, antispam, a simple, straight-forward security framework for preventing, detecting, and responding to attacks and, last but not least, employee training.




An IT analyst adept enough to muse on any and every topic out there and I write sometimes….

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

The HUMAN App: step-by-step tutorial for new and existing users

Sparkpoint Ecosystem Whitepaper Updates: Staking Program

This is how i hacked into your corporate network using your own anti virus agent

JWT Key Confusion Attack: Part1

Personal data as an asset class: creating a more valuable digital citizen

Personal Data: an Introduction to a very personal Asset Class

The Internet of Things

Cybersecurity Metrics and ISMS Maturity

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
sam asif

sam asif

An IT analyst adept enough to muse on any and every topic out there and I write sometimes….

More from Medium

Are your employees the weakest link in your network security?

Cyber Risk Quantified is Cyber Risk Managed.

An Investigation into Obfuscation

How to Get Free Malware Samples and Reports