Combating Against Cyber Security Threats in 2021

Combating Against Cyber Security Threats in 2021


Spread the love

Cybersecurity refers to the protection of computer systems from theft or damage to their hardware, software, electronic data, and the disruption or misdirection of the services they provide.

With the Covid 19 pandemic dependence on internet technologies increased globally .

Organizations and companies are adopting working from home, and more home deliveries by grocery stores.

Nevertheless, restaurants to court proceedings are being followed virtually among others as mitigation measures to combat the virus.

The world of cybercrime has also discovered new avenues to strengthen their hold and are becoming more creative in executing their bent schemes.

You need to get conversant with the developing cybersecurity threats and how to combat them as discussed below;


It is a form of social engineering attack .

It occurs when a hacker uses a false identity to trick someone into providing sensitive information.

One may also be tricked into downloading malware, or visiting sites containing malware.

Phishing attacks target people through email .

An attacker creates an email looking like it comes from your local bank or the government asking you to visit a website and enter your username and password.

When clicking links or giving sensitive data,  try to be cautious even if it appears genuine .

Consequently , when in doubt, contact the source directly to make sure they sent the message.

 Watch out for unusual emails and instant messages that may start with unfamiliar wording with grammatical errors or have a generic signature.

Lastly, install anti-phishing toolbars on internet browsers that alert you of sites containing phishing information.


It is an SMS- based phishing where an attacker sends an SMS text message to a user’s phone.

When you open the text message sent, it does not start the attack but contains a link when clicked begins the attack.

Attackers prefer smishing to general phishing that occurs online through emails or web browsing because its programs such as Microsoft Outlook or Google are smart enough to detect phishing emails and label them as spam.

A smishing attack may be receiving a message from” your bank asking you to enter your social security number.

As well as a delivery carrier asking you to schedule a package delivery, or other organizations asking you to click a link or give information.

Most banks and businesses do not ask for information through SMS messages but rather call you or send you an email. 

Therefore, never open a link in a text message.

You should also watch for misspellings or generic language like;  Dear Customer, Sir or  Madam .”

PDF Scams

PDF scams aim at making you open an attached PDF.

The attack involves sending an email with a message stating that a security policy is updated or an account statement is attached that exposes you to malware or ransomware on your computer when clicked.

  In-office setup, employers should train their staff to watch for generic or unusual email addresses and generic headings.

Also, make sure you have updated and secure virus protection on your computers and network because having security in place goes a long way in protecting your business and alerting your IT department if someone happens to open up a PDF scam.

Malware and Ransomware 

When malware enters a computer, it steals, deletes, or encrypts data and tracks a computer’s activity without their knowledge.

 Ransomware involves a hacker locking the victim’s computer or files and holding the information for ransom.

The attack requires the victim to produce a payment in exchange for the hijacked files and unlocking the system.

Ransomware spreads through phishing emails or visiting an infected website unknowingly.

Malware occurs through internet downloads, USB external drives, and physical hard drives.

 A company should protect itself from malware and ransomware by avoiding outdated software, drivers, and other plugins because they are common security vulnerabilities.

You should also enable click-to-play plugins to keep Flash or Java running unless clicked to reduce the risk of running malware programs with them.

In conclusion, normalize updating your router periodically to protect sensitive data from hackers because an unsecured network will always be prone to attacks.

It is easier for hackers to find an overlooked security vulnerability to take advantage of. An upgraded and updated system will not give them access.

Sharing is Caring

Do you have a groundbreaking story you would like us to publish? Please reach us through [email protected]. You can also contact Instantly.