Cybersecurity Threats: Are You Safe?

By Enterprise Security Magazine | Monday, May 20, 2019

FREMONT, CA: A common belief among all internet users is that they are safe from attacks and threats. But the reality is different; the practices that most people follow place them in vulnerable positions. Not updating security applications, using the same passwords at various places, not changing passwords regularly, and not using unique secret keys are some of the mistakes commonly made by people.

In a recent survey carried out by Google in association with Harris Polls, some clearly outlined trends give an insight into how literate people are about Internet-based threats and evolving security problems. While 52% of people accepted that they did reuse a few passwords, only 35% said that they had separate passwords everywhere. Some 13% confessed that they used the same password everywhere. A variation in the practices could be marked, across the generations. While the younger generation showed a more casual attitude towards security concerns, the older generation exhibited a more cautious stance. Although the older generation takes better care of their online security, it is the younger generation that is better updated about new developments.

Necessary precautions against these common mistakes can enhance security substantially and help mitigate cybersecurity threats. Phishing, which is more likely to be defined as a means of fraud, wherein emails from fake addresses try to lure users into divulging information such as card details, seems to be a significant threat. An attitude of suspicion while opening emails from unknown sources is advisable. A careful approach is essential while setting and dealing with passwords as well. Two-factor authentications, which involve a two-step verification process rather than just one password, is a useful tool for better security. Password managers are also extremely helpful in dealing with a large number of passwords and are mostly safe.

Overall, treating cybersecurity issues with seriousness and following the necessary steps can go a long way in guarding users. A path to recovery in case of any attacks should also be charted from the beginning, in order to prevent losses and mitigate risks.  

Weekly Brief