In regards to the tasks resulting from the Act on the National Cybersecurity System, we present you the basic information on cybersecurity, threats and ways to protect yourself against them.
Cybersecurity, in accordance with applicable regulations, is the resistance of information systems to activities that violate the confidentiality, integrity, availability and authenticity of processed data or related services offered by these systems. Any events that have or may have an adverse effect on cybersecurity are called threats or incidents.
The most popular threats in cyberspace are:
-
social engineering attacks (for example, phishing, a method of obtaining confidential information by impersonating a trustworthy person or institution);
-
theft (fraud), modification or destruction of data;
-
identity theft;
-
attacks using malicious software (malware, viruses, worms, etc.);
-
blocking access to services;
-
spam (unwanted or unnecessary electronic messages that may contain links to malicious software).
Examples of ways to protect yourself from threats:
-
updating your operating system and applications without unnecessary delay;
-
installing and using anti-virus and anti-spyware software. It is best to use real-time protection;
-
updating anti-virus software and the virus database;
-
checking downloaded files from Internet using an anti-virus program;
-
remembering to run a firewall;
-
not opening files of unknown origin;
-
using banking, email or social networking sites that have a valid security certificate, unless you are 100% sure from another source that such a site is safe;
-
regularly scanning your computer and checking network processes. If you do not know how to do this, ask someone who does to check it. Sometimes malware establishes its own connections to the Internet, sending your passwords and other private data to the network. It can also install itself on your computer despite of good protection;
-
not using unverified security programs or to publish your own files on the Internet (they can, for example, connect unwanted lines of code to the source of the page);
-
regular backups of important data;
-
trying not to visit sites that offer amazing attractions (free videos, music, or easy money by sending spam) too often - such sites usually contain hidden viruses, Trojans and other threats;
-
not leaving personal data on unverified services and sites unless you are absolutely sure that they are not visible to third parties and not sending any confidential data in open text form in e-mails, for example, data should be password-protected and encrypted. It is best to send the password in a secure manner using another means
of communication; -
remember that no bank or office sends e-mails to its clients/interested parties asking for a password or login in order to verify them.
Understanding cybersecurity threats and using methods of protecting yourself against threats is essential knowledge for every user of a computer, smartphone or internet services. Remember that the best way to protect yourself from the negative effects of threats is preventive action.