October is often seen as a turning point in the year. Summer is well and truly over, the nights are drawing in and it will be Christmas before you know it. This October can be a turning point for your cyber security too.
That’s because October is cyber security awareness month. All over the world, the cyber security industry is raising awareness for security best practices, to keep individuals and businesses safe from new and existing cyber threats.
History of Cyber Security Month
The idea of a cyber security awareness month originates from the United States. In 2004, the department of homeland security and the National Cyber Security Alliance launched the first awareness month. 16 years later, campaigns are stronger than ever. So much so that there are organisations across the world trying to raise awareness, many with government backing.
ACUTEC Are Here For You
Throughout October, we’re going to be sharing tips and tricks to improve your systems’ security, as well as advice on spotting cyber threats to keep you safe. Make sure you keep checking our website and all of our social platforms for advice on:
- …and more!
Here are a few tasters:
Phishing involves sending fraudulent communications that appear to come from a reputable source. It is usually done through email or text message. The aim of phishing attacks is to usernames and passwords, credit card information or to install malware on the victim’s machine. Phishing is one of the most common types of cyber attack.
Passwords give us access to our online accounts. Passwords are difficult to remember, and can cause a lot of panic if they’re forgotten. That’s why lots of people opt for easy to remember words, and use the same few passwords on all of their accounts. You should not do this. If you use the same password for important accounts, and that password is compromised, cyber criminals have access to all your accounts with that email and password combination. You should always use unique passwords for all your accounts.
MFA stands for multi factor authentication. It is sometimes known as two factor authentication. With MFA, users must provide at least two credentials to prove their identity and access online accounts. Generally, when you enter an email address and password, you will be asked to enter a code – sent via text message or generated by an authenticator app.
Malware is intrusive software that is designed to damage and destroy computers and network systems. Malware is a contraction for “malicious software.” Examples of common malware includes viruses, worms, Trojan viruses, spyware, adware, and ransomware.
Ransomware is a type of malware. It encrypts a victim’s data until the attacker is paid – the data is held to ransom. Typically, the attacker demands payment in a form of cryptocurrency such as bitcoin. Only then will the attacker send a decryption key to release the victim’s data – but there is no guarantee that they will actually let you recover your files.
When it comes to cyber security, we’re here for you. If you’re concerned about security and whether your systems or users are vulnerable, get in touch with ACUTEC today.