Information Today, Inc. Corporate Site KMWorld CRM Media Streaming Media Faulkner Speech Technology DBTA/Unisphere
PRIVACY/COOKIES POLICY
Other ITI Websites
American Library Directory Boardwalk Empire Database Trends and Applications DestinationCRM Faulkner Information Services Fulltext Sources Online InfoToday Europe KMWorld Literary Market Place Plexus Publishing Smart Customer Service Speech Technology Streaming Media Streaming Media Europe Streaming Media Producer Unisphere Research



Vendors: For commercial reprints in print or digital form, contact LaShawn Fugate (lashawn@infotoday.com)

Magazines > Information Today > September 2024

Back Index Forward
SUBSCRIBE NOW!
Information Today
Vol. 41 No. 7 — September 2024
OUTSIDE THE BOX
Insights on Content

Internet Safety Basics: Keeping Cyber Thieves at Bay
by Michelle Fitzhugh-Craig

There used to be a time when being safe online only meant making sure kids stayed away from sites that were inappropriate for their age. Now, we need to make sure that what is shared on the internet is accurate and that both children and adults are not bullied. A 2024 study of adolescents across 44 countries published by the World Health Organization found that while school bullying remained steady over the past 6 years, instances of cyberbullying have risen.

Another aspect of being online is knowing that we have to safeguard our finances and personal information. “The number of reported data breaches in the U.S. rose to a record 3,205 in 2023, up 78% from 2022 and 72% from the previous high-water mark in 2021, according to the nonprofit Identity Theft Resource Center. Trends are similar in other parts of the world,” The Wall Street Journal reported in March. One reason for the increase is that “[r]ansomware gangs are on the rise, allowing even criminals with minimal computer knowledge to get into the game.”

BREACH VS. CYBERATTACK

Before writing this, I didn’t realize there was a difference between a data breach and a cyberattack. IBM defines a data breach as:

any security incident in which unauthorized parties access sensitive or confidential information, including personal data (Social Security numbers, bank account numbers, healthcare data) and corporate data (customer records, intellectual property, financial information).

IBM defines a cyberattack as:

any intentional effort to steal, expose, alter, disable, or destroy data, applications, or other assets through unauthorized access to a network, computer system or digital device.

IBM makes the distinction that “[t]he terms ‘data breach’ and ‘breach’ are often used interchangeably with ‘cyberattack.’ However, not all cyberattacks are data breaches. Data breaches include only those security breaches where someone gains unauthorized access to data.”

Malware attacks and password thefts are two common ways to gain access that people hear about—and they are known to damage, destroy, and disrupt. In recent years, these threats have spread fear and uncertainty among individuals and businesses alike. “The average cost of a data breach is USD 4.35 million,” according to IBM. “This price tag includes the costs of discovering and responding to the violation, downtime and lost revenue, and the long-term reputational damage to a business and its brand.” So, what can be done to ease anxiety about cyberthreats of all kinds? Here are two important ways to help you take steps toward protecting yourself—or re-evaluate the ways you already do—while embracing our digital world.

ANTIVIRUS SOFTWARE

Not only is it important to install antivirus software, but making sure you keep it updated is a must. Three of 2024’s top-rated (by various publications) options include:

  • Norton—offers access to LifeLock identity protection services with its subscription and real-time cyber-protection
  • Bitdefender—takes up minimal space and comes with a VPN, safe banking tools, and a firewall
  • Avast One—hides those pesky pop-ups, reminders, and other distractions

All three provide several plans and features for PC, Mac, Android devices, and iPhone/iPad.

PASSWORDS

If you are one of those people who uses predictable word or letter combinations; birthday or anniversary dates; a sequence of numbers, names, street names, cities, etc., connected to you or someone close to you; and/or the words “password” or “admin” (both are still choices that are among the most common, per AARP) to access your online accounts, then you need to read this tip.

Hackers are experts in determining passwords. All it takes is one cyber-thief to figure out your email login, and many of us are liable to unknowingly hand over bank account, credit card, and/or other information because we wanted to have passwords easy enough to remember. The National Institute of Standards and Technology recommends using 12-character passwords at minimum—the longer the better.

Use two-factor verification, which will allow the account you are accessing to send an email or text to you with a code or option to confirm it is really you. There is also multifactor authentication, which means you must use two out of three different forms of authentication: something you know, you are, or you have.

Using a unique password for every login sounds next to impossible. However, if you choose the suggested password for every login that offers one, opt to reset it, and slightly tweak the original suggested password to be closer to your preferred password, that may help. You can also Google to find a password generator—typically free—and answer the prompts, then tweak the result to your liking.

Special characters (punctuation marks, dollar signs, asterisks, etc.) are a great way to get creative when choosing a password. Instead of the letter o, use a zero, or use an exclamation mark instead of the letter i. So the password to your favorite pizza place, for example, could become “d0m!n0’$p!zza” for Domino’s Pizza.

LINKS TO THE SOURCES

World Health Organization study on bullying
who.int/azerbaijan/news/item/27-03-2024-one-in-six-school-aged-children-experiences-cyberbullying--finds-new-who-europe-study

The Wall Street Journal article on data breaches
wsj.com/tech/cybersecurity/why-are-cybersecurity-data-breaches-still-rising-2f08866c

IBM data breach definition
ibm.com/topics/data-breach

IBM cyberattack definition
ibm.com/topics/cyber-attack

Norton
us.norton.com

Bitdefender
bitdefender.com

Avast One
avast.com/en-gb/avast-one

AARP password tips
aarp.org/home-family/personal-technology/info-2023/build-better-passwords.html

National Institute of Standards and Technology password tips
auditboard.com/blog/nist-password-guideline

Michelle Fitzhugh-Craig
MICHELLE FITZHUGH-CRAIG
is an award-winning journalist, the owner of MFC3 Media (mfc3media.maginecreativeservices.com), the publisher/founder of
shades Magazine (shadesmagazine.com), a Literacy Liberator tutor with the Oakland Unified School District, and a faculty lecturer in San Francisco State University’s department of journalism. She is president of the Exceptional Women in Publishing’s board of directors and is a former three-term board member for the National Association of Black Journalists. Fitzhugh-Craig is the mother of four grown children and has five grandchildren. She lives in Oakland, California, with her two daughters and granddaughter. Send your comments about this article to itletters@infotoday.com.
 




q q