Protecting
your individual identify, use to mainly include, keeping your name, social
security, ID card numbers, bank account information safe and confidential
possible in a lockbox, safe in your home or safety deposit box. Technology has
vastly shown us the value no longer only lies within your personal information,
but it also lies within your online habits. As our text in TestOut, (2024),
Chapter 2 mentions our world of improved technology also brings on the need for
increased cyber security to protect those same things, plus everything else
associated with your digital footprint. Personal identifiable information (PII)
is key details, rather direct or indirect, that reveal a person’s identity
(TestOut 2024). It is extremely important to not dismiss the risk and growing
cybercriminal threats; we need to learn what actions to take to protect
individuals and businesses by safely managing our data. Companies have the
additional responsibility of protecting and securing clients PII from
cybercriminals. Understanding the different types of threats and how to protect
against them helps companies remain trustworthy while still retaining the
resourceful information needed to make the business grow. “Protecting organizations from cyber threats
requires understanding the common characteristics of these attacks”
(First Business Bank, n.d.).
In the physical world,
thieves attempt to steal your items in all classes of unethical ways; (i.e.
breaking in your car, breaking in your home, stealing a purse/wallet…). Social engineering attacks are similar in
that manner; cybercriminals are creative in how they try to steal your PII. Cybersecurity
and Infrastructure Security Agency (n.d.) describes phishing/smishing and
maleware/ransomeware as common cyber-attacks. “Malware is any software used to
gain unauthorized access to IT systems in order to steal data, disrupt system
services or damage IT networks in any way. Ransomware is a type of malware
identified by specified data or systems being held captive by attackers until a
form of payment or ransom is provided” (Cybersecurity and Infrastructure
Security Agency, n.d.). While phishing
is associated with fraudulent emails, smishing are text messages that
fraudulently impersonate legitimate companies (First Business Bank, n.d.). The
emails and text try to entice the user to click on malicious links to reveal
sensitive personal or company information. I have personally been a victim of
being impersonated. My contractors received smishing text as though it was me
from a random phone number. The attacker
tried to get those closest to me, to purchase gift cards, and send them the
code of each card. We were able to avoid any attacks by my contractors having
my only direct contact number, and having a group chat showing everyone was
receiving the same smishing text within hours of each other.
Professionally and
personally, we all have to create layers of protection to fight against
cyber-attacks. Creating protection layers for individuals and companies is a
growing niche within the information technology industry. Companies can train
staff to avoid getting hacked by teaching to never give out login information
and credentials, do not open email attachments or click on links unless it is
from a trusted sender, and always work on a secured network or use a VPN when
dealing with personal information. With phishing and smishing, First Business
Bank (n.d.), suggest you send the text to 7726 which allows wireless companies
to track and block scammers. If you receive what appears to be suspicious email
or text from a company, contact that company before clicking links or moving
forward. CISA, or Cybersecurity and Infrastructure Security Agency (n.d.) have
resources to mitigate the impact of cyberattacks as well. Cyber security will
continue to be an ongoing improvement for our government, companies and individuals
to be more proactive in an attempt to stay ahead of cybercriminals and
protecting what seems meaningless, when it is more valuable than we realize.
References:
Cybersecurity and
Infrastructure Security Agency. (n.d.). Malware, phishing, and ransomware. U.S. Department of Homeland
Security. https://www.cisa.gov/topics/cyber-threats-and-advisories/malware-phishing
and-ransomware
First Business Bank.
(n.d.). Protection from smishing and phishing. First Business Bank. https://firstbusiness.bank/resource-center/protection-from-smishing-and
phishing/
TestOut Corp. (2024). CertMaster Learn Tech+. http://www.testout.com
Comments
Post a Comment