• Latest
  • All
  • How To
REPORT: African Countries Lost At Least 2 Billion Dollars to Cyberattacks in 2016

How To Combat Against Cyber Security Threats in 2021

May 3, 2022
spotify-mobile

Spotify Introduces ‘Snooze’ Button to Temporarily Mute Overplayed Tracks

May 12, 2025
Google messages

Google Messages Rolls Out Delete for Everyone and Major RCS Upgrades

May 12, 2025
samsung galaxy 25 edge

Samsung Galaxy S25 Edge To Launch May 13. Here’s What To Expect

May 12, 2025
Samsung QLED TVs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

May 9, 2025
DHgate Tablet Cases deals
Apple Smart Glasses

Apple Is Making Its Own Chip for Smart Glasses Coming by 2027

May 9, 2025
Safaricom

Safaricom Breaks Barriers with $3B Milestone and Bold Ethiopia Play

May 9, 2025
Private Number calls

How to Handle Private Number Calls in Kenya

May 8, 2025
Kenya Power EV charging stations

Kenya Power Rolls Out 45 EV Charging Stations Across the Country

May 8, 2025
Bayobab

MTN’s Bayobab Connects Uganda and Kenya with New Fiber Route

May 8, 2025
Airtel Africa Starlink partnership

Starlink Is Expanding in Africa Through New Airtel Partnership

May 8, 2025
Android FreeType patch

Android May 2025 Security Update Fixes Critical FreeType Zero-Click Vulnerability

May 7, 2025
worldcoin kenya

Court Ruling Orders Worldcoin to Delete All Kenyan Biometric Records

May 7, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

How To Combat Against Cyber Security Threats in 2021

Samuel K Itotia by Samuel K Itotia
May 3, 2022
in Lists
Reading Time: 4 mins read
264
0

Cybersecurity refers to the protection of computer systems from theft or damage to their hardware, software, electronic data, and the disruption or misdirection of the services they provide. With the Covid-19 pandemic that increased dependence on internet technologies globally with organizations and companies adopting working from home, more home deliveries by grocery stores, restaurants to court proceedings being followed virtually among others as mitigation measures to combat the virus.

The world of cybercrime has also discovered new avenues to strengthen their hold and have become more creative in executing their bent schemes. You need to get conversant with the developing cybersecurity threats and how to combat them as discussed below;

Phishing

It is a form of social engineering attack that occurs when a hacker uses a false identity to trick someone into providing sensitive information, downloading malware, or visiting sites containing malware. Phishing attacks target people through email where an attacker creates an email looking like it comes from your local bank or the government asking you to visit a website and enter your username and password.

When clicking links or giving sensitive data,  try to be cautious even if it appears genuine and when in doubt, contact the source directly to make sure they sent the message. 

Watch out for unusual emails and instant messages that may start with unfamiliar wording with grammatical errors or have a generic signature. Lastly, install anti-phishing toolbars on internet browsers that alert you of sites containing phishing information.

Smishing

It is an SMS- based phishing where an attacker sends an SMS text message to a user’s phone. When you open the text message sent, it does not start the attack but contains a link when clicked begins the attack.

Attackers prefer smishing to general phishing that occurs online through emails or web browsing because its programs such as Microsoft Outlook or Google are smart enough to detect phishing emails and label them as spam.

Some common smishing attacks include; receiving a message from” your bank asking you to enter your social security number, a delivery carrier asking you to schedule a package delivery, or other organizations asking you to click a link or give information. Most banks and businesses do not ask for information through SMS messages but rather call you or send you an email.  Therefore, never open a link in a text message. You should also watch for misspellings or generic language like: Dear Customer, Sir or Madam.

Malware and Ransomware 

When malware enters a computer, it steals, deletes, or encrypts data and tracks a computer’s activity without their knowledge. Ransomware involves a hacker locking the victim’s computer or files and holding the information for ransom.

Ransomware requires the victim to produce a payment in exchange for the hijacked files and unlocking the system. Ransomware spreads through phishing emails or visiting an infected website unknowingly while malware occurs through internet downloads, USB external drives, and physical hard drives. A company should protect itself from malware and ransomware by avoiding outdated software, drivers, and other plugins because they are common security vulnerabilities.

You should also enable click-to-play plugins to keep Flash or Java running unless clicked to reduce the risk of running malware programs with them. Normalize updating your router periodically to protect sensitive data from hackers because an unsecured network will always be prone to attacks. It is easier for hackers to find an overlooked security vulnerability to take advantage of. An upgraded and updated system will not give them access. To update your internet router you can login to your router’s web interface by typing the default gateway IP (192.168.1.1, 192.168.0.1, or lookup on your network details)  in your browser address bar and locate firmware updates and update from there.

PDF Scams

PDF scams aim at making you open an attached PDF. The attack involves sending an email with a message stating that a security policy is updated or an account statement is attached that exposes you to malware or ransomware on your computer when clicked.

In-office setup, employers should train their staff to watch for generic or unusual email addresses and generic headings.

Also, make sure you have updated and secure virus protection on your computers and network because having security in place goes a long way in protecting your business and alerting your IT department if someone happens to open up a PDF scam.

SendShare146Tweet92
Samuel K Itotia

Samuel K Itotia

IT Project Consultant, Bachelor of Computer Science holder, Microsoft Certified IT Professional. Certified Google Apps Cloud Deployment specialist and Trainer. Passionate on the new trends of Technology. He will always share it with the world.

Related Posts

spotify-mobile

Spotify Introduces ‘Snooze’ Button to Temporarily Mute Overplayed Tracks

May 12, 2025
Google messages

Google Messages Rolls Out Delete for Everyone and Major RCS Upgrades

May 12, 2025
samsung galaxy 25 edge

Samsung Galaxy S25 Edge To Launch May 13. Here’s What To Expect

May 12, 2025
Samsung QLED TVs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

May 9, 2025
Apple Smart Glasses

Apple Is Making Its Own Chip for Smart Glasses Coming by 2027

May 9, 2025
Safaricom

Safaricom Breaks Barriers with $3B Milestone and Bold Ethiopia Play

May 9, 2025

Latest

spotify-mobile

Spotify Introduces ‘Snooze’ Button to Temporarily Mute Overplayed Tracks

May 12, 2025
Google messages

Google Messages Rolls Out Delete for Everyone and Major RCS Upgrades

May 12, 2025
samsung galaxy 25 edge

Samsung Galaxy S25 Edge To Launch May 13. Here’s What To Expect

May 12, 2025
Samsung QLED TVs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

May 9, 2025
Apple Smart Glasses

Apple Is Making Its Own Chip for Smart Glasses Coming by 2027

May 9, 2025
Safaricom

Safaricom Breaks Barriers with $3B Milestone and Bold Ethiopia Play

May 9, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

Spotify Introduces ‘Snooze’ Button to Temporarily Mute Overplayed Tracks

May 12, 2025

Google Messages Rolls Out Delete for Everyone and Major RCS Upgrades

May 12, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

Introducing A Brainbox Quiz: Techweez’s Monthly Trivia Night!

5 Most Reliable Virtual Dollar Card Providers in Nigeria

More News

How to Handle Private Number Calls in Kenya

Kenya Power Rolls Out 45 EV Charging Stations Across the Country

MTN’s Bayobab Connects Uganda and Kenya with New Fiber Route

Starlink Is Expanding in Africa Through New Airtel Partnership

Android May 2025 Security Update Fixes Critical FreeType Zero-Click Vulnerability

Court Ruling Orders Worldcoin to Delete All Kenyan Biometric Records

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.