24-0724/
Blog
In today’s digitally-driven world, cybersecurity has become a paramount concern, especially for the younger generation—Gen Z. In a recent podcast episode of “Secure Horizons,” three interns from MUSE Electronics shared their experiences and insights into cybersecurity, emphasizing its importance and how Gen Z interacts with it. This blog provides a detailed summary of their discussion, exploring key concepts and practical advice for staying safe online.
Listen here!
PART 1: THE FOUNDATIONS OF CYBERSECURITY
Defining Cybersecurity
Cybersecurity encompasses the measures, processes, and technologies designed to protect computer systems, networks, and data from attacks, damage, and unauthorized access. It’s a blend of the actions taken by end users on their devices and the security measures implemented in software programs. Despite robust programming, there are always vulnerabilities that need addressing through both user vigilance and technological solutions.
Cybersecurity involves various layers of protection spread across computers, networks, programs, or data that one intends to keep safe. In an organization, the people, processes, and technology must all complement one another to create an effective defense from cyberattacks.
The Importance of Cybersecurity
Cybersecurity is crucial because it protects data from theft and damage. This includes all types of data, form login details, personal photos and documents and many more.
Without a cybersecurity program, your organization cannot defend itself against data breach campaigns, making it an irresistible target for cybercriminals.
Types of Cyber Threats
1. Malware
Malware is a broad term used to describe any malicious software, regardless of how it works, its intent, or how it’s distributed. This includes viruses, worms, Trojans, and spyware. Each type of malware has its own way of causing damage.
Viruses: Like the flu, these programs attach themselves to clean files and infect other clean files. They can spread uncontrollably, damaging a system’s core functionality and deleting or corrupting files.
Trojans: This type of malware disguises itself as legitimate software or is hidden in legitimate software that has been tampered with. Trojans tend to act discretely and create backdoors in your security to let other malware in.
Spyware: This software secretly records what you do, so that cybercriminals can make use of this information. Spyware can capture things like credit card details, addresses, private photos and other sensitive data.
2. Phishing
Phishing attacks use fake communications, such as email, to trick the recipient into opening it and following the instructions inside, such as providing a credit card number or other sensitive data. Phishing is an increasingly sophisticated form of attack, with messages often looking like legitimate communications from known institutions like banks, carriers or insurance companies.
Real-Life Examples of Cyber Threats
During the podcast, Kiyan shared a personal experience where he accidentally downloaded a Trojan along with an ad blocker. The Trojan, disguised as legitimate software, turned out to be a crypto miner, which hijacked his laptop’s processing power to mine cryptocurrency like Bitcoin. This slowed down his laptop by up to 70%. Fortunately, this Trojan did not harm his data or laptop in any other way.
How easy it is to get someone’s personal information
For show purposes Kiyan was able to create a fake Facebook login page in minutes, which seemed legit. This demonstrated how easy it is for attackers to trick users into providing their credentials by replicating legitimate websites. It underscores the importance of being vigilant and verifying the authenticity of web pages before entering sensitive information.
Antivirus Software and Firewalls
Antivirus software and firewalls are often the first line of defense in securing computers and data. Antivirus software scans, detects, and removes viruses from your computer. It can also provide protection against other forms of malware, such as spyware and adware.
A firewall acts as a barrier between your computer and the internet, only allowing certain types of data to pass through. It can be a hardware device, software program, or a combination of both. A firewall can help prevent unauthorized access to your computer or network by blocking certain types of traffic.
Virtual Private Networks (VPNs)
A Virtual Private Network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
VPNs are important tools for maintaining privacy online. They mask the user’s IP address, making their actions hardly traceable.
However, as Kiyan pointed out during the podcast, VPNs are not foolproof and do not protect against phishing attacks. They secure your connection but do not prevent you from falling prey to scams that trick you into voluntarily giving up your information.
Two factor authentication
Two factor authentication is a login system that requires more than one method of authentication. With not only a password but also a code sent to your mail, two factor authentication ensures the authenticity of the user.
The importance of Secure Passwords
A strong password is a crucial part of cybersecurity. Passwords should be long, complex, and unique. Using a combination of letters, numbers, and special characters makes it harder for attackers to guess or crack passwords.
Valentin emphasized the importance of not reusing passwords across different sites. If one site gets hacked, and your password is compromised, it can potentially expose your other accounts if the same password is used.
Awareness and Education
Continuous education and awareness are essential to cybersecurity. Users need to be educated about the potential risks and trained on how to recognize and avoid them. This includes understanding the nature of phishing scams, the importance of updating software, and being cautious about the information shared online.
Educating especially Gen Z about cybersecurity is vital for their safety and for the security of the digital world in the future. Kiyan says schools and universities should incorporate cybersecurity into their curricula. Already starting for people at the age of 8, teaching pupils about the risks and how to mitigate them, would be the ideal scenario.
PART 2: CYBERSECURITY AND GEN Z
Digital Habits of Gen Z
Generation Z (born in the years of 1995-2010), the first generation to grow up with the internet, this generation is known for its digital savviness. They are comfortable using technology and spend a significant amount of time online. This, however, can sometimes backfire and leads to more exposure regarding online scams.
Gen Z often shares more personal information online than previous generations, making them more vulnerable to cyber threats. Their digital habits, such as using social media extensively, increase their exposure to potential attacks.
Risks Specific to Gen Z
Over-Sharing on Social Media. The tendency to share personal information on social media platforms can lead to various security risks. Cybercriminals can use the digital footprint of persons to commit crimes in other names. Samuel highlighted the importance of being cautious about what is shared online and adjusting privacy settings on social media to restrict who can view personal information.
Differences in Generations
Studies show that younger generations, like Gen Z, are more often victims of cyberattacks because they spend more time online. However, older generations like baby-boomers and Gen X are preferred targets for hackers and online scammers since these generations usually have more financial resources and are not as internet-savvy, taking longer to even realize that they have been harmed.
Cookies
In the digital realm, cookies are small pieces of data stored in the local storage the first time you log into a website. Typically, you encounter a prompt asking if you want to accept cookies. By accepting, an ID or some identifying information about you is stored locally, enabling the website to recognize you upon your return. This does not mean it tracks what a visitor is doing but rather identifies who you are.
Are Cookies Safe?
Most of the time Cookies are safe to accept, it mostly depends on one’s personal preferences. Some people like personalized offers, other people are in the believe it is an invasion of privacy.
Are Cookies part of one’s digital footprint?
Regarding your digital footprint, cookies do not really contribute to it. Tools like Google Analytics might forward some data to companies, but this information is typically secure and not public. Unless there’s a data breach or illegal data sale, companies usually store this data securely. The stringent EU data protection regulations offer robust legal safeguards, ensuring that your data remains protected from misuse.
Some best practices to ensure online safety
- Strong, Unique Passwords: Encouraging the use of password managers to generate and store unique passwords for different accounts.
- Enabling Multi-Factor Authentication: Adding an extra layer of security to online accounts.
- Being Skeptical of Unsolicited Messages: Verifying the authenticity of emails and messages before clicking on links or downloading attachments.
- Keeping Software Updated: Regularly updating operating systems and applications to patch vulnerabilities.
- Limiting Information Sharing: Being mindful of the information shared on social media and adjusting privacy settings accordingly.
CONCLUSION
The “Secure Horizons” podcast provides a comprehensive look at cybersecurity through the lens of Gen Z. Valentin, Kiyan, and Samuel offer valuable insights into the fundamental aspects of cybersecurity, the specific risks faced by Gen Z, and the measures that can be taken to protect against these threats.
In today’s digital age, cybersecurity is not just a concern for tech experts; it is a critical aspect of everyday life for everyone, especially the digitally native Gen Z. By understanding the importance of cybersecurity and adopting best practices, individuals can protect their personal information and contribute to a safer digital world.
As cyber threats continue to evolve, staying informed and vigilant will be key to navigating the digital landscape safely. The discussions and tips shared in the “Secure Horizons” podcast are a valuable resource for anyone looking to enhance their cybersecurity knowledge and practices.
By fostering a culture of awareness and proactive protection, we can collectively work towards a more secure and resilient digital future.