Defenses
There are a number of ways that individuals and organizations can protect themselves from the risk of cyber attacks. Here are some critical components of an online defense.
There are a number of ways that individuals and organizations can protect themselves from the risk of cyber attacks. Here are some critical components of an online defense.
Passwords are the first line of defense for accessing accounts and systems. I highly encourage the use of strong passwords. A good password should be:
Long (at least 15 characters)
Unique (should not be used anywhere else)
Difficult to guess
Multi-Factor Authentication (MFA) adds an extra layer of security by requiring not only a password but also a second form of identification, such as a code sent to a phone or an email. That way, even if a malicious actor gets your password, you are still protected.
A firewall is a system that acts as a barrier between a trusted internal network (such as a school network) and an untrusted external network (like the internet). Firewalls monitor and control incoming and outgoing network traffic based on security rules. Firewalls protect against unauthorized access to the network, helping to block hackers, malware, and other threats before they can reach vulnerable systems or sensitive data. They act as a first line of defense, ensuring that only trusted connections are allowed.
There are two main types of firewalls:
Hardware Firewalls: These are physical devices placed between the network and the internet to filter traffic. They protect the entire network by blocking unauthorized access. Your internet access device at home will have a built-in firewall. Our school network has a dedicated firewall device.
Software Firewalls: These are installed on individual computers or devices and provide an extra layer of security by filtering traffic specifically on those devices. Your computer's operating system has a built-in software firewall, which may alert you when you try to install untrusted software.
Anti-virus software (also called anti-malware) is designed to detect, prevent, and remove malicious software, such as viruses, worms, ransomware, and other harmful programs. Anti-virus programs scan files and programs on a computer to identify patterns or signatures that match known threats. When a virus or malware is detected, the software quarantines or deletes the harmful file to prevent it from spreading. Most operating systems have some form of anti-virus software built-in. One of the most important aspects of anti-virus software is keeping it updated. New viruses and malware are constantly being created, so frequent updates ensure that the software can recognize and stop the latest threats.
Backups are copies of data or systems that are stored separately from the original. Backing up important data ensures that it can be recovered in the event of a cyberattack, hardware failure, or accidental deletion. Many would argue that backups are the most important form of defense of all, because, when done correctly, they ensure your data is safe even if a computer or network is compromised.
Backups can be local (saved on the same computer or in the same building), remote (saved in another physical location), or in the cloud (on someone else's computer, in another location). Any truly important files (such as big projects, or irreplaceable photos) should be backed up in at least 2 places, so that if one backup fails the data is still protected.
One of the simplest but most effective defenses is keeping software and systems up to date. Software developers frequently release updates that fix security vulnerabilities. Installing these updates, known as patches, helps close off potential entry points for attackers. While updates are easy to apply, they are one of the most-ignored aspects of cybersecurity!
Humans are almost always the weakest part of a security system. There is only so much that can be done from a technological standpoint to counteract human error. That is why training computer users is so important to computer security. Almost every business, organization, and school does some form of security training.