Why is cyber security an important aspect we need to look into, especially in the 21st century?\r\n\r\nNews stories about identity theft, fraud, and data breaches proliferate, is affecting a lot of internet users. That means said, the aftermath is not subjective to only one party but as a whole in the society. Arguably cyberattacks are unavoidable, it's crucial to have a good understanding of what cyber security truly is. And how we can imply these precautions to effectively reduce potential threats.\r\n\r\nIn an era where almost everyone and everything is connected online, the threat of personal information exposure is vulnerable. By any mistakes, the disclosure of one's identity is in jeopardy and the consequences is not only for ones to bare.\r\n\r\nHence, the importance of cyber security is becoming a more prevalent topic in modern society. Especially when we more or less integrate our life onto all vertical of social media mediums. Thus, knowing the importance of cybersecurity should always come into play.\r\n\r\n\r\nWhat is Cybersecurity?\r\nI.T. company CISCO defines \u201ccybersecurity\u201d as \u201cthe practice of protecting systems, networks, and programs from digital attacks.\u201d And it's widely used as a measure to remove or minimize threats or any kinds of vulnerabilities. That includes applying and implementing preventive actions to maintain the integrity of all data, data security, and other cybersecurity-related operations.\r\n\r\nWe have to understand that anything that we do to communicate, transact, or interact over the cyberspace, is vulnerable to cyber-attacks. If you're not convinced, let\u2019s take a look at some of the recent cyber attacks that happened to some of the companies and organizations.\r\n\r\n \tFacebook\r\n\r\nEven the social media titan \u2014 Facebook experienced a data breach. Resulting in millions of user records being exposed to Amazon\u2019s cloud server. Allowing third-party access to exploit these leaked data for illegal activities.\r\n\r\n\r\n \tYahoo\u00a0\r\n\r\nIn 2013, one of the world\u2019s largest search engines confirmed that a whopping 3 billion accounts \u2014 including email, Tumblr, Flickr, and Fantasy account\u00a0were compromised.\r\n\r\n\r\n \tUnderArmour\r\n\r\nOne of the world's most famous sports apparel brands, the nutrition app \u2014 MyFitnessPal, suffered a data breach in February 2018, impacted roughly around 150 million app users with their usernames, email addresses, and passwords.\r\n\r\n\r\n \tUnited Kingdom\u2019s National Health Services (NHS)\r\n\r\nAs a result of these cyber-attacks, (NHS) canceled 19,500 medical appointments, 600 GP surgeries, even five hospitals had to divert ambulances to elsewhere. And all these are due to the \u201cWannaCry\u201d malware attack.\r\nJudging from these incidents, we can conclude that major companies and enterprises, even the government, are vulnerable to cyber-attacks. For this reason, knowing the importance of cybersecurity, and how to combat the issue is vital for government in all vertical. While there are millions of unreported cyber attacks, it's equally important you can be a victim if precautions is not taken.\r\n\r\n\r\nEvolution of cyber attack\r\nMany would think that the term \u201ccybersecurity\u201d came up prior to the digital era. But did you know that there was already an incident of \u201ccyber attack\u201d dated in 1903?\r\n\r\nOver the years, as technology advances, the technology that hackers use for infiltration and disruption are on par too. That is why it is imperative for businesses, and users as well, to educate themselves on not falling into these cyberattacks.\r\nCybersecurity threats: Knowing Your Enemy\r\nKnowing the importance of cyber security helps to understand your enemy better. Ultimately, we know how to take precaution for the worst. Start by understanding the computer viruses, bugs, hacking. And since computers and other smart devices are now being more technologically advanced, hackers are also stepping up their A-game when creating viruses and spyware.\r\n\r\n \t\r\nPhishing\r\n\r\n\r\nOne of the most common cyber attacks, as the name sounds, phishing is a method that hackers use to collect sensitive user information, in the form of an email. These emails resemble emails coming from reputable sources, but in reality, its aim is to collect sensitive data like passwords, and credit card information.\r\n\r\n\r\n \t\r\nVishing\u00a0\r\n\r\n\r\nIf phishing's primary medium is email, vishing uses voice to collect information from the user, using a telephone. One example of vishing is a fake bank or insurance company representative that will call your phone.\r\n\r\n\r\n \t\r\nSmishing\r\n\r\n\r\nA new type of phishing, smishing uses SMS or text message that hackers use to collect information, where you will receive a text message that resembles from your bank or insurance company, asking you to call a specific number.\r\n\r\n\r\n \t\r\nMalware\r\n\r\n\r\n\u00a0Malicious software for short, it is any program, or software that exist to gain unauthorized access or damage to a computer. Some of the types of malware are computer viruses, worms, Trojan horses, and spyware.\r\n\r\n\r\n \t\r\nRansomware\r\n\r\n\r\nWho would have thought that computers can be "kidnapped?" Another type of malicious software, ransomware was designed to extort money by blocking access to the files or the computer system, until a certain amount of "ransom" is paid.\r\nUnderstanding these different forms of cyber threats is the first line of defence to combat these attacks. It is worth noting that even the tiniest information that you disclose, such as our password, is enough for these hackers to collect more information from the user.\r\n\r\n\r\nStanding Up To the Threat: Taking Precautions From Cyber-attacks\r\nUnlike top-tier companies that have big financial support for cybersecurity; individual users and small to medium enterprises might find it difficult to invest in cybersecurity due to limited financial support.\r\n\r\nHowever, better awareness of these threats and proper understanding of the importance of cybersecurity can prove to be beneficial. Especially helpful in avoiding data breaches, confidential information exploitation, underground secret trades, or information misconduct. We listed down some examples of data security, and how can you prevent cyberattacks from happening.\r\n\r\n \t\r\nAvoid sketchy hyperlinks\/advertising\r\n\r\n\r\nIf you\u2019re using email for communication, never open suspicious emails coming from sources that you are not familiar with, especially on your \u201cSpam\u201d folder. Avoid entering\/opening emails with a suspicious attachment without confirming with the senders.\r\nThis is because these unauthorized links may contain malware that will not just illegally collect your personal information without your consent, but it might also attack your computer system. Hence, when browsing the internet, avoid clicking those links that display \u201ctoo good to be true\u201d advertisements. The link redirection to an infected website is likely the culprit to your computer system failure.\r\n\r\n\r\n \t\r\nDon't disclose personal information online\r\n\r\n\r\nBe alert when someone asks for personal information, including credit card information and address over the internet, text or calls. A legitimate party is most unlikely to demand any information without a valid reason and acknowledgment. We recommend the user to do a background check first if you\u2019re unsure whom you\u2019re dealing with. Ask questions and always refer to the official caller from your bank.\r\n\r\n\r\n \t\r\nInvest in anti-virus software\r\n\r\n\r\nThough most devices nowadays have pre-installed antivirus on their system. Make it a point to update the software so that you can be assured that the virus and malware definitions are up to date.\r\n\r\n\r\n \t\r\nMake a back-up recovery\r\n\r\n\r\nIf you have time, consider making a back-up for your important programs and documents. Just in case the worst thing happened, your devices are compromised. You can either invest in a good external hard drive (HDD) or a solid-state drive (SSD). If not, cloud storage is a good alternative.\r\n\r\nFinal thoughts\u2026\r\nIt goes without saying that \u201cprevention is better than cure.\u201d And while we know that living in the digital era has made our lives easier, we have to understand that there's always an underlying ugly truth. It means, our privacy and our private information have become more vulnerable than ever before.\r\n\r\nBeing vigilant and understanding the importance of cybersecurity should be our priority as a responsible user. In this day, information is just right at the end of our fingertips. It is up to you if you\u2019re going to use to your advantage.