W2 : Protecting Your Digital Fortress: Understanding the Importance of Cybersecurity

Cybersecurity is a growing concern as household devices are increasing globally and are expected to keep increasing. The biggest attraction of household or smart home devices is that they can be controlled through an internet connection anywhere. (Ali, 2022) Household devices can make home life much easier but could also open you up to security threats. (Gainer, 2022)

 


FUTURE VISION

Let us imagine a future where cybersecurity will become the top priority and our digital world will be secure. In this ideal state, robust security measures have become the primary determinant of every single individual and organisation. Cybersecurity are rare, everyone can conduct third-party transactions safely without too much worry. The digital landscape is a safe and trusted environment for all. However, reality is crucial, cybersecurity breaches can happen through smart home devices and web browsers, we need to emphasize the need for vigilance.


SOLUTIONS

1. create strong and unique passwords
Creating strong and unique passwords is quite essential to protect our online accounts from unauthorised access. Password strength is measured by how easy it is to guess or break the password using brute force. To crack a password, hackers will utilise computers to test millions of permutations of characters. Passwords made up solely of letters and digits are easy for modern computers to hack. Overall, here are the main characteristics of a good, secure password:

  • at least 12 characters long. The longer your password is the better.
  • Uses uppercase and lowercase letters, numbers and special symbols. Passwords that consist of mixed characters are harder to crack.
  • Doesn't contain memorable keyboard paths.
  • should not based on your personal information.
  • Password is unique for each account you have.

 


(Jančis, 2022)

2. Clear Cybersecurity guidelines and policies
Establish clear and comprehensive security policies and guidelines that can outline what employees should do to keep things safe online. These policies should include :

  • Access control
  • Identification and Authentication (including multi-factor authentication and passwords)
  • Data classification
  • Encryption
  • Remote access
  • Acceptable use
  • Patching
  • Malicious code protections
  • Physical security
  • Backups
  • Server security (e.g. hardening)
  • Employee on/offboarding
  • Change management 

 


(Dunham, 2020)

3. keep software up to date
It's important to regularly update the firmware and software of household devices and web browsers. Manufacturers often release updates regularly that usually contain new features, fixed bugs and better performance. (Keeping Devices and Software up to Date, n.d.)

 


These solutions' inspiration comes from realising that cybersecurity is a shared responsibility. It is not enough for individuals or organisations to protect themselves in isolation. By working together, we can create a safer digital world for everyone. Through continuous learning and collaboration, we are able to implement the right security tools and technologies to avoid falling victim to cyberattacks.

 


References

Ali, M. H. (2022, January 30). Smart Home Security: Security and Vulnerabilities. Wevolver. https://www.wevolver.com/article/smart-home-security-security-and-vulnerabilities

Dunham, R. (2020, May 5). The Importance of A Company Information Security Policy. Linford & Company LLP. https://linfordco.com/blog/information-security-policies/

Gainer, A. (2022, April 19). Smart devices could leave your home vulnerable to security threats—CBS New York. https://www.cbsnews.com/newyork/news/smart-devices-hacked-security-threats/

Jančis, M. (2022, April 5). How to Create a Strong Password (with Examples). Cybernews. https://cybernews.com/best-password-managers/how-to-create-a-strong-password/

Keeping devices and software up to date. (n.d.). Retrieved July 7, 2023, from https://www.ncsc.gov.uk/collection/device-security-guidance/managing-deployed-devices/keeping-devices-and-software-up-to-date

Comments

Popular posts from this blog

Exploring Euthanasia: The Intersection of Personal Choice and End-of-Life Decisions

W4 : The Intersection of Police Surveillance and Facial Recognition: Balancing Security and Privacy

W3 : The Impact of Social Media on Courage: Does it Make Us More Brave?