Premium Only Content
Cybersecurity and the Human Response
Before I start with this article I would like to ask, have you ever been the victim of hacking or unlawful accessing of your data?
Has your business computer been hacked?
Has someone stolen your intellectual property?
The reality is we are living in the digital age, and it is so rapidly evolving with all those new updates, gadgets, and cyber security software that sometimes even I have found myself “left behind”.
Then for a moment I ask myself, “how many people have no clue what is going on with cyber security and how fraudsters and hackers operate and who they are targeting, when and why?”
The Covid lockdowns and remote work in actuality left most of society and business very much vulnerable while fraudsters and hackers utilised these circumstances to the maximum for their advantage.
I must now define what is Cyber Security and what better source to ask, than the always correct, willing and ready to answer, internet.
Yes, correct. I asked the internet to define Cyber Security. No doubt, if I asked several Cyber Security experts, I would be given different answers so let’s keep it nice and tidy and let the all-mighty internet answer for all of us.
Hence, the definition Cyber Security is:
“Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats. The practice is used by individuals and enterprises to protect against unauthorized access to data centres and other computerized systems.”
By this definition, we can all agree that our computers, phones and all our digital gadgets are a part of the nexus where cyber security and protection from cyber threats is applied.
In reality that is not so true.
According to Savvy’s online report (Bill Tsouvalas, 12th May 2022) [1] , in Australia 1 cyber-attack occurs every 10 minutes targeting SME’s, one in four Australians have fallen victim to identity fraud, and cybercriminals can penetrate 93% of company networks.
The most interesting and scariest fact is that cybercriminals can penetrate 93% of company networks. That is a truly scary fact and even more so as we are “working from home” where our security of our digital devices depends on commercial software and downloads from the internet.
I needn’t go further; the fraudsters and cybercriminals have already explored the loopholes.
While we, I mean, we humans, individuals, cannot protect our digital assets, perhaps we can believe that governments can protect themselves better.
An absolutely fair belief, however, pollination of cyberthreats is going from individuals to companies to the government sector. Perhaps via different modus operandi of executing cyber-attack but the true target remains the same, the human.
For more understanding on how governments and countries are becoming a target of cyber attackers, hackers and cyber terrorists please check the current war in Ukraine and Russia and how governments respond to prevent hacking and cyber terrorism. According to MSSP Alert’s article (Joe Panettieri, 23rd June 2022) [2] one thing we all have in common is in the palm of our hands. Regardless of whether you are a government employee or an individual working in your business or perhaps you are in charge of developing new medicine, it is your mobile phone.
A strange fact is that smartphones are the primary delivery method for attacks, cyber-attacks, and hacks.
To add weight on that fact, we can certainly say that there are plenty of senior citizens who don’t know what cyber terrorism is, what hacking is. After all, I personally find myself wondering sometimes when I get an SMS.
An SMS with a link from the government of course. Just click the link, or the Tax Man will be after you. This is my favourite and people will either click the link or press that number to “cancel” because they are late with their tax return. It is becoming harder and harder to distinguish between true and false links, phone calls, and emails.
Fraudsters are utilising their best weapon on disposal, their imagination. Imagination supported with documents, facts, web sites, and of course, SOPs on the internet on how to prevent fraud, cyber-attacks, and hacks.
The first line of defence and the last one in cyber space is the human. The human firewall, not software, not technological or mechanical, but human.
Thank you all, Mario.
Follow Mario Bekes Here:
https://www.mariobekes.com.au/
https://insightintelligence.com.au/
https://www.linkedin.com/in/mariobekes/?originalSubdomain=au
#intelligence #riskmanagement #insightintelligencegroup #mariobekes #industrialespionage #economicespionage #humanintelligence #investigations #investigativeintelligence #interviewtraining #dubaibusiness #singaporebusiness #fraudprevention #claimsmanagement #leadership #coaching #motivation #corporate #organisations #llawofattraction #inspiration #motivation #education
-
1:58:10
Robert Gouveia
1 day agoMatt Gaetz REJECTS Report, Sues Committee; Luigi Fan Club Arrives; Biden Commutes; Festivus Waste
261K202 -
1:31:40
Adam Does Movies
23 hours ago $14.13 earnedThe Best & Worst Christmas Movies! - LIVE!
92.6K8 -
58:10
Kimberly Guilfoyle
1 day agoAmerica is Back & The Future is Bright: A Year in Review | Ep. 183
183K70 -
3:03:27
vivafrei
1 day agoEp. 242: Barnes is BACK AGAIN! Trump, Fani, J6, RFK, Chip Roy, USS Liberty AND MORE! Viva & Barnes
256K247 -
2:05:48
2 MIKES LIVE
6 hours agoTHE MIKE SCHWARTZ SHOW with DR. MICHAEL J SCHWARTZ 12-24-2024
32.1K3 -
1:14:17
MTNTOUGH Fitness Lab
1 day agoNavy SEAL Dom Raso: The Cold, Hard Truth About Modern Brotherhood | MTNPOD #96
25.5K4 -
43:42
Dad Dojo Podcast
22 hours ago $0.69 earnedEP14: Every Girl Dad's Biggest Fear and How To Prevent It
17.7K -
55:06
Bek Lover Podcast
16 hours agoWill Trump Pull Off A Miracle? Other Strange News Podcast...
15.1K18 -
55:53
PMG
1 day ago $0.52 earned"Hannah Faulkner and Courtney Reed | BEHIND THE LENS OF A TRUMP PHOTOGRAPHER"
12.4K -
8:09:50
Dr Disrespect
1 day ago🔴LIVE - DR DISRESPECT - MARVEL RIVALS - GOLD VANGUARD
232K38