Cybersecurity is not just a matter for an organization, but also for individuals. Taking into account some basic cybersecurity tips contributes to the optimal protection of information and avoiding cyber attacks. Tips for creating secure passwords range from using a combination of letters (upper and lower case), numbers, and special characters such as to using a password manager that can automatically generate secure passwords and store them securely so you don’t have to remember them all. Other tips for choosing a strong password include “don’t mix upper and lower case letters: Including both upper and lower case letters in a password can significantly increase its complexity and don’t use personal information: Personal information, such as names, dates of birth or phone numbers, should not be used as passwords.
Although authorities and even
Companies are increasingly betting on the cybersecurity culture of organizations, it is worth noting Job Function that last year, “73% of the 200 most common passwords in remain the same . In addition, 83% of the passwords on this year’s list can be cracked in less than a second. The importance of acquiring culture on this subject lies not only in the economic cost that it represents for companies, but also on a personal level. Data breaches can lead to identity theft, cyberbullying can cause lasting emotional damage, and attacks on critical infrastructure can jeopardize national security. And trust in technology and the digital economy is shaken when security is not guaranteed.
This is why the teacher and specialist
Nieves Balboa Mingo , professor at the UDIMA University , shares that “to defend ourselves from cyber threats, the basic thing is to detect them, classify them, see where they come from, and identify them by attributing Arabia Email List the origin of the attack ; the latter is usually the most difficult. The threat will seek to intrude on its target, obtain the highest levels of access and, even, remain to learn; finally, obtain information or damage, destroy. The interesting thing is to determine the purpose of the threat, before it materializes. That purpose is usually: cyber espionage, cyber sabotage, cyber terrorism and attacking the institutions or the target organization.