Network Security

 


    Protecting your individual identify, use to mainly include, keeping your name, social security, ID card numbers, bank account information safe and confidential possible in a lockbox, safe in your home or safety deposit box. Technology has vastly shown us the value no longer only lies within your personal information, but it also lies within your online habits. As our text in TestOut, (2024), Chapter 2 mentions our world of improved technology also brings on the need for increased cyber security to protect those same things, plus everything else associated with your digital footprint. Personal identifiable information (PII) is key details, rather direct or indirect, that reveal a person’s identity (TestOut 2024). It is extremely important to not dismiss the risk and growing cybercriminal threats; we need to learn what actions to take to protect individuals and businesses by safely managing our data. Companies have the additional responsibility of protecting and securing clients PII from cybercriminals. Understanding the different types of threats and how to protect against them helps companies remain trustworthy while still retaining the resourceful information needed to make the business grow.  “Protecting organizations from cyber threats requires understanding the common characteristics of these attacks” (First Business Bank, n.d.).
    In the physical world, thieves attempt to steal your items in all classes of unethical ways; (i.e. breaking in your car, breaking in your home, stealing a purse/wallet…).  Social engineering attacks are similar in that manner; cybercriminals are creative in how they try to steal your PII. Cybersecurity and Infrastructure Security Agency (n.d.) describes phishing/smishing and maleware/ransomeware as common cyber-attacks. “Malware is any software used to gain unauthorized access to IT systems in order to steal data, disrupt system services or damage IT networks in any way. Ransomware is a type of malware identified by specified data or systems being held captive by attackers until a form of payment or ransom is provided” (Cybersecurity and Infrastructure Security Agency, n.d.).  While phishing is associated with fraudulent emails, smishing are text messages that fraudulently impersonate legitimate companies (First Business Bank, n.d.). The emails and text try to entice the user to click on malicious links to reveal sensitive personal or company information. I have personally been a victim of being impersonated. My contractors received smishing text as though it was me from a random phone number.  The attacker tried to get those closest to me, to purchase gift cards, and send them the code of each card. We were able to avoid any attacks by my contractors having my only direct contact number, and having a group chat showing everyone was receiving the same smishing text within hours of each other.
    Professionally and personally, we all have to create layers of protection to fight against cyber-attacks. Creating protection layers for individuals and companies is a growing niche within the information technology industry. Companies can train staff to avoid getting hacked by teaching to never give out login information and credentials, do not open email attachments or click on links unless it is from a trusted sender, and always work on a secured network or use a VPN when dealing with personal information. With phishing and smishing, First Business Bank (n.d.), suggest you send the text to 7726 which allows wireless companies to track and block scammers. If you receive what appears to be suspicious email or text from a company, contact that company before clicking links or moving forward. CISA, or Cybersecurity and Infrastructure Security Agency (n.d.) have resources to mitigate the impact of cyberattacks as well. Cyber security will continue to be an ongoing improvement for our government, companies and individuals to be more proactive in an attempt to stay ahead of cybercriminals and protecting what seems meaningless, when it is more valuable than we realize.

 

References:

Cybersecurity and Infrastructure Security Agency. (n.d.). Malware, phishing, and      ransomware. U.S. Department of Homeland Security.             https://www.cisa.gov/topics/cyber-threats-and-advisories/malware-phishing and-ransomware

First Business Bank. (n.d.). Protection from smishing and phishing. First Business Bank.          https://firstbusiness.bank/resource-center/protection-from-smishing-and phishing/

TestOut Corp. (2024). CertMaster Learn Tech+. http://www.testout.com

Comments