Cyber attacks and data breaches have become a daily threat to both individuals and businesses. The different types of cyber risks are seemingly limitless and it’s all but impossible to predict exactly how and when you or your business may become a target for cyber criminals.
Adding to the uncertainty is the reality that cyber threats are often difficult to identify and comprehend. Some cyber incidents take a long time (weeks, months or years) to be discovered and identified.
Cyber risks include the following threats:
- Individually-owned devices such as computers, tablets, mobile phones, and gaming systems that connect to the Internet are vulnerable to intrusion. Personal information may be at risk without proper security.
- Vulnerability to data breach and loss increases if an organization’s network is compromised. Information about a company, its employees, and its customers can be at risk.
- Transportation, power, and other services may be disrupted by large scale cyber incidents. The extent of the disruption is highly uncertain as it will be determined by many unknown factors such as the target and size of the incident.
- Organized cybercrime, state-sponsored hackers, and cyber espionage can pose national security risks to businesses and governments
Here are 25 tips from Ready.gov for what to do to prevent and manage a cyber attack.
Cyber attack prevention
1. Only connect to the Internet over secure, password-protected networks.
2. Do not click on links or pop-ups, open attachments, or respond to emails from strangers.
3. Always enter a URL by hand instead of following links if you are unsure of the sender.
4. Don’t respond to online requests for personally identifiable information (PII).
5. Limit who you are sharing information with by reviewing the privacy settings on all social media accounts.
6. Trust your gut; if you think an offer is too good to be true, then it probably is.
7. Don’t use the same password twice; choose a password that means something to you and you only; change your passwords on a regular basis.
8. If you see something suspicious, report it to the proper authorities.
Actions to take during an online breach
9. Check to make sure the software on all of your systems is up-to-date.
10. Run a scan to make sure your system is not infected or acting suspiciously.
11. If you find a problem, disconnect your device from the Internet and perform a full system restore.