{"id":935,"date":"2023-06-22T10:45:58","date_gmt":"2023-06-22T02:45:58","guid":{"rendered":"https:\/\/www.info-trek.com\/blog\/?p=935"},"modified":"2024-05-02T12:07:38","modified_gmt":"2024-05-02T04:07:38","slug":"have-you-experience-a-cyber-attack-before","status":"publish","type":"post","link":"https:\/\/www.info-trek.com\/blog\/have-you-experience-a-cyber-attack-before\/","title":{"rendered":"Have you experience a cyber attack before?"},"content":{"rendered":"\n<p>After our previous post on\u00a0the evolution of Cyber Security skill and how to build a cyber security culture, some of you might have a question popped up \u2013 What exactly is cyber security?<\/p>\n\n\n\n<p>This article aims to help you answer that question so that you do not have to look elsewhere.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is Cyber Security?<\/h2>\n\n\n\n<p>Simple, it\u2019s the action of protecting hardware, software, and data that are internet-connected from cyber attack. \u2013 period<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cyber Security is not that simple at all.<\/h2>\n\n\n\n<p>If it is that simple, there won\u2019t be so many cases of cyber attack that make their way to international news.<\/p>\n\n\n\n<p>From big companies like Marriott Hotel, Sony and Adobe to countries like South Korea and Russian, all of them had faced some serious cyber attack before. Worst still, things are getting more complicated in 2019, since the proficient of hacker has been improving daily.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How many types of cyber attack available?<\/h2>\n\n\n\n<p>Tons of it. There are so many types of cyber attack available, it\u2019s just impossible to list all out.<\/p>\n\n\n\n<p>However, below are a few famous ones;<\/p>\n\n\n\n<p><em><strong>Ransomware<\/strong><br><\/em>This type of attack basically aims at ransoming the computer owner by locking their computer system files so that they are unable to access it until they have made payment to the hacker.<\/p>\n\n\n\n<p><em><strong>Phishing<\/strong><\/em><br>Pronounce as\u201d \u2018fiSHiNG \u201c, is as the name itself. The hacker will send fraud email, which usually will look like from a reputable source, to fish out sensitive data from the receiver.<\/p>\n\n\n\n<p><em><strong>Malware<\/strong><\/em><br>A type of program file, which if user click or installed it, will inject viruses like Trojan and Spyware into the user\u2019s computer<\/p>\n\n\n\n<p><em><strong>Social engineering<\/strong><\/em><br>It\u2019s not as friendly as it sounds. This type of attack aimed at human weakness. The attacker will have a person to make human interaction with the user, in hope to trick the user to share sensitive data.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Why Cyber Security<\/h2>\n\n\n\n<p>Cyberattack has resulted in huge lost (<em><a rel=\"noreferrer noopener\" href=\"https:\/\/www.thesundaily.my\/archive\/cyber-attacks-may-cost-malaysia-us122b-economic-losses-BUARCH563767\" target=\"_blank\">USD 12.2 billion for Malaysia based on research<\/a><\/em>), cyber security must be treated seriously.<\/p>\n\n\n\n<p>Having cyber security does not mean that the attack will not happen. Instead, the purpose of cyber security is to prevent and defense from being attack.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How many types of security available?<\/h2>\n\n\n\n<p>Since there are so many types of attack, there will be so many types of defenses.<\/p>\n\n\n\n<p>Penetration testing, IoT security, Cyber Security Awareness, Big data security are just some of the major defenses one need to carry look into.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Final Verdict\u2026.<\/h2>\n\n\n\n<p>Two words, \u201cNo Joke\u201d. Cyber security is not a joke, especially at this time. And it does not only apply to corporate, but the individual will also have to be aware of the importance of cyber security.<\/p>\n\n\n\n<p>Company owner will need to build a culture of cyber security in their company as humans are the primary factor of a security breach. Always remember, prevent, and not react.<\/p>\n\n\n\n<p>To learn more about Courses related to cyber security, please visit&nbsp;Info trek kaapagam cyber security page<\/p>\n\n\n\n<p>Source of information: Tech Target Search Security<\/p>\n","protected":false},"excerpt":{"rendered":"<p>After our previous post on\u00a0the evolution of Cyber Security skill and how to build a cyber security culture, some of you might have a question popped up \u2013 What exactly is cyber security? This article aims to help you answer that question so that you do not have to look elsewhere. What is Cyber Security? [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":745,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-935","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/posts\/935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/comments?post=935"}],"version-history":[{"count":3,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/posts\/935\/revisions"}],"predecessor-version":[{"id":1932,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/posts\/935\/revisions\/1932"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/media\/745"}],"wp:attachment":[{"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/media?parent=935"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/categories?post=935"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/tags?post=935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}