Eight Types of Cybersecurity ​​Threats You Need to Watch Out For

- 08 December 2022 15:28 WIB
Cyber ​​threat illustration. (Photo/Pixabay/Werner Moser)
Cyber ​​threat illustration. (Photo/Pixabay/Werner Moser)

"Cellphones that experience this may quickly run out of battery and may even suffer damage due to overheating of the components," he said.

Seventh, Poor Password Management (poor password hygiene). Many people use passwords that are easy to guess.

Also Read: BSSN Campaigns for Cyber ​​Security Cultural Literacy Among Highschool Students with #JagaRuangSiber Program

In fact, the use of the same word is done for various accounts and does not activate two-factor authentication or two-factor authentication (2FA).

"This is an example of poor password management, making our devices and social media accounts vulnerable to hacking," said Ariandi.

Eighth, fraud through mobile advertising (mobile ad fraud).

A number of cellphone applications are inserted by malware, a program that infiltrates cell phones to carry out certain activities.

One of them is running certain ads that will benefit the malware authors.

"This malware can run on our phones without us knowing it and slow down the phone's performance, drain its battery, incur higher data costs, or cause it to overheat," he said.

Even so, Ariandi also shared a number of safety tips in the digital realm.

Also Read: Ministry of Tourism Launches 100 Archipelago Tour Packages Ahead of Holidays

These things need attention to protect the security of the phone.

Use Safe Networks-Be alert when using public or free Wi-Fi, and do not enter sensitive information on public networks.

Then, strengthen account security starting by checking cellphone security features, creating strong passwords, creating different passwords for each account, using Password Manager to save passwords, and enabling 2FA for each account on social media.

Avoid Phishing Attempts, be aware of suspicious website links, be careful with impersonators, be wary of requests for personal information, be wary of e-mail scams, such as gift offers, and check files before downloading.

Page:
1
2
3
4

Editor: Muhamad Al Azhari

Tags

Related Article

Latest News

X