We all know we cannot do without internet, it’s like bread and butter. We use it for paying bills, online shopping, sharing documents, photos, videos to friends and family, for promotion of business, making any bank transactions, increasing our knowledge and skills and many others. As a layman we use internet so casually just like using the free wi-fi during business travel to complete important presentation. Little do we know that this important presentation can be hacked by attackers as public wi-fis are not secured and important information like business data, bank account details, phone numbers, emails can easily be leaked.
It is so alarming to know that approximately 421 million records were breached in the month of October-2019. Some of the prominent examples are Aadhar details of 6.7 Mn users containing details such as names, addresses and numbers were leaked on Indane LPG’s website. Some others were Justdial’s database was leaked of over 100 Mn users, Indian Army which has most sensitive information of the country also had reported breaching of data, it received 23 cyber-attacks in the year 2019 and many others. So, we can say that in the digital space our identity can be breached at any moment.
Do you know travel and transportation industry is the 2nd most targeted industry for cyber-attacks in the year 2018, as mentioned by IBM customers. In todays scenario we are interconnected with each other as any happenings in the world has an impact on the countries. This leads to the fact that cyber risk is increasing in all the countries and as per Quick Heal report through the year 2019 India witnessed 973 million cyber-attacks were registered on Windows Devices in past one year and Trojans were considered to be the major cause for downloading unauthorised softwares in the devices. While on Android devices unwanted applications, forged/duplicate/malicious apps are considered to be the major source of cyber attack. This gives rise to device insecurity as the major cause of concern as the losses that can arise due to cyber attack is leaps and bounds.
Therefore let us find out ways in which private or business information can be prevented from cyber thefts:-