{"id":3426,"date":"2023-02-15T04:23:19","date_gmt":"2023-02-15T04:23:19","guid":{"rendered":"https:\/\/sagaratechnology.com\/blog\/?p=3426"},"modified":"2023-03-16T04:30:26","modified_gmt":"2023-03-16T04:30:26","slug":"cybersecurity-basics-it-workers-need-to-know","status":"publish","type":"post","link":"https:\/\/sagaratechnology.com\/blog\/cybersecurity-basics-it-workers-need-to-know\/","title":{"rendered":"Cybersecurity Basics IT Workers Need to Know"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/zB6G45-UQi43q6mvX82SY1cAN5f4oYmUbo_OTBukxoIDsE-quN68U-6UG-kDdzubn7y8hDiqaZl64AtelxWlswLEwqknslGthRHBtehuvPP8o-xKv7f9nyT4Ottf6am3gl3FUzfLLjt9V1rk6H1gnnE\" alt=\"Cybersecurity Basics\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Cybersecurity is the discipline of safeguarding vital systems and sensitive data against digital threats. Cybersecurity measures, also known as information technology (IT) security, are designed to resist attacks against networked systems and applications, regardless of where the threats originate.<\/p>\n\n\n\n<p>The global average cost of a data breach rose 2.6% from $4.24 million in 2021 to $4.35 million in 2022, the highest it has ever been, according to IBM Security&#8217;s &#8220;The Cost of a Data Breach Report.&#8221; These costs include identifying and responding to the breach, the cost of downtime and lost revenue, and the long-term reputational damage to a business and its brand. <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/cybercriminals\" target=\"_blank\" rel=\"noreferrer noopener\">Cybercriminals<\/a> target personally identifiable information (PII)\u2014such as names, addresses, national identity numbers (e.g., Social Security numbers in the United States, fiscal codes in Italy), and credit card information\u2014and then sell these details on underground digital marketplaces. The compromise of PII frequently results in a loss of customer confidence, regulatory fines, and potential legal action.<\/p>\n\n\n\n<p>Due to different technology and a lack of in-house expertise, security system complexity can magnify these expenses. However, firms with a comprehensive cybersecurity strategy controlled by best practices and automated using advanced analytics, artificial intelligence (AI), and machine learning may combat cyber threats more effectively and limit the lifetime and impact of breaches when they occur.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-69e7895f92966\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69e7895f92966\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/sagaratechnology.com\/blog\/cybersecurity-basics-it-workers-need-to-know\/#Dangerous_myths_about_cybersecurity\" >Dangerous myths about cybersecurity<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/sagaratechnology.com\/blog\/cybersecurity-basics-it-workers-need-to-know\/#Common_cyber_threats\" >Common cyber threats<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/sagaratechnology.com\/blog\/cybersecurity-basics-it-workers-need-to-know\/#Malware\" >Malware<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/sagaratechnology.com\/blog\/cybersecurity-basics-it-workers-need-to-know\/#Ransomware\" >Ransomware<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/sagaratechnology.com\/blog\/cybersecurity-basics-it-workers-need-to-know\/#Phishing_social_engineering\" >Phishing \/ social engineering<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/sagaratechnology.com\/blog\/cybersecurity-basics-it-workers-need-to-know\/#Internal_threats\" >Internal threats<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/sagaratechnology.com\/blog\/cybersecurity-basics-it-workers-need-to-know\/#DDoS_Distributed_Denial-of-Service_attacks\" >DDoS (Distributed Denial-of-Service) attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/sagaratechnology.com\/blog\/cybersecurity-basics-it-workers-need-to-know\/#Advanced_persistent_threats_APTs\" >Advanced persistent threats (APTs)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/sagaratechnology.com\/blog\/cybersecurity-basics-it-workers-need-to-know\/#Man-in-the-middle_attacks\" >Man-in-the-middle attacks<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Dangerous_myths_about_cybersecurity\"><\/span><strong>Dangerous myths about cybersecurity<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Globally, the number of cybersecurity incidents is on the rise, but many people still have the wrong idea that:<\/p>\n\n\n\n<ul>\n<li><strong>Cybercriminals are external parties<\/strong>. In reality, most cybersecurity breaches are caused by malevolent insiders acting alone or collaborating with outside hackers. These insiders may be a part of well-organized, nation-state-backed groups.<\/li>\n<\/ul>\n\n\n\n<ul>\n<li><strong>People know about risks<\/strong>. In fact, the risk surface is still growing, as thousands of new holes are found in both old and latest apps and devices. And there are more and more chances for human error, especially by careless employees or contractors who accidentally cause a data breach.<\/li>\n<\/ul>\n\n\n\n<ul>\n<li><strong>There are no open doors for attacks<\/strong>. Cybercriminals find new ways to attack all the time. These include Linux systems, operational technology (OT), Internet of Things (IoT) devices, and cloud environments.<\/li>\n<\/ul>\n\n\n\n<ul>\n<li><strong>My sector is secure<\/strong>. Cyber enemies exploit the necessity of communication networks in the vast majority of government and private-sector organizations, posing a threat to every industry. For instance, ransomware attacks target more sectors than ever, including local governments and non-profit organizations, and risks to supply chains, &#8220;.gov&#8221; websites, and vital infrastructure have also increased.<\/li>\n<\/ul>\n\n\n\n<p>Read Also About <a href=\"https:\/\/sagaratechnology.com\/blog\/4-start-up-cybersecurity-guidelines\/\" target=\"_blank\" rel=\"noreferrer noopener\">4 Start-up Cybersecurity Guidelines<\/a><\/p>\n\n\n\n<h2><span class=\"ez-toc-section\" id=\"Common_cyber_threats\"><\/span><strong>Common cyber threats<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Although cybersecurity professionals work hard to plug security breaches, attackers constantly search for new ways to evade IT detection, circumvent defenses, and exploit developing vulnerabilities. Utilizing work-from-home environments, remote access tools, and new cloud technologies, the most recent cybersecurity risks give &#8220;known&#8221; threats a fresh spin. These evolving dangers consist of the following:<\/p>\n\n\n\n<h3><span class=\"ez-toc-section\" id=\"Malware\"><\/span><strong>Malware<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Refers to harmful software variations, such as worms, viruses, Trojans, and spyware, that gain unauthorized access to a computer or cause damage to it. Malware attacks are becoming increasingly &#8220;lifeless&#8221; and designed to evade standard detection methods, such as antivirus software that scans for dangerous file attachments.<\/p>\n\n\n\n<h3><span class=\"ez-toc-section\" id=\"Ransomware\"><\/span><strong>Ransomware<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Ransomware is a type of virus that encrypts files or deletes data, recent ransomware attacks have targeted state and municipal governments, which are easier to infiltrate than companies, and are under pressure to pay ransoms to restore citizen-reliant programs and websites.<\/p>\n\n\n\n<h3><span class=\"ez-toc-section\" id=\"Phishing_social_engineering\"><\/span><strong>Phishing \/ social engineering<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Phishing is a form of social engineering that deceives individuals into divulging their personally identifiable information or sensitive data. In phishing schemes, emails or text messages appear from a reputable organization requesting personal data, such as credit card information or login credentials. The FBI has observed a rise in pandemic-related phishing attacks in tandem with the expansion of remote employment.<\/p>\n\n\n\n<h3><span class=\"ez-toc-section\" id=\"Internal_threats\"><\/span><strong>Internal threats<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>If they abuse their access permissions, current employees or anybody else who has previously had access to systems can be deemed an insider threat. Traditional security solutions such as firewalls and intrusion detection systems which focus on external threats might be blind to insider risks.<\/p>\n\n\n\n<h3><span class=\"ez-toc-section\" id=\"DDoS_Distributed_Denial-of-Service_attacks\"><\/span><strong>DDoS (Distributed Denial-of-Service) attacks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>A DDoS assault seeks to bring down a server, website, or network by overwhelming traffic, typically from many systems working in concert. The assaults overload enterprise networks utilizing the simple network management protocol (SNMP). <\/p>\n\n\n\n<h3><span class=\"ez-toc-section\" id=\"Advanced_persistent_threats_APTs\"><\/span><strong>Advanced persistent threats (APTs)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>In an APT, an attacker or group of intruders infiltrate a system and remain undiscovered for a lengthy time. The intruder leaves networks and systems alone so they can listen in on business conversations and get sensitive information without setting off security measures. The recent Solar Winds&#8217; intrusion into government systems in the United States is an example of an APT.<\/p>\n\n\n\n<h3><span class=\"ez-toc-section\" id=\"Man-in-the-middle_attacks\"><\/span><strong>Man-in-the-middle attacks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>In a man-in-the-middle attack, a cybercriminal steals information by reading and spreading messages between two parties. For instance, an attacker can intercept data passing between a guest&#8217;s device and the network on an unsecured Wi-Fi network.<\/p>\n\n\n\n<p>Implementing effective cybersecurity is now difficult due to the large number of devices compared to users, and assaults are becoming more imaginative.<\/p>\n\n\n\n<p>Given the importance of cybersecurity, the company must make substantial steps to develop a dependable data and information security architecture. Develop competent personnel and establish a standard operational procedure in data and information management about cybersecurity standards<\/p>\n\n\n\n<p>One of the most popular cybersecurity standards is ISO\/IEC 270001:213 Information technology\u2014Security techniques\u2014Information security management systems\u2014Requirements. The system was first released in 2005 and has been modified multiple times since then, it is intended to improve information security and related policies in order to help avoid the misuse and tampering of sensitive data and computing systems. ISO\/IEC 27001 certification can also help organizations gain better consumer trust.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is the discipline of safeguarding vital systems and sensitive data against digital threats. Cybersecurity measures, also known as information technology (IT) security, are designed to resist attacks against networked systems and applications, regardless of where the threats originate. The global average cost of a data breach rose 2.6% from $4.24 million in 2021 to&#8230;<\/p>\n","protected":false},"author":26,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Basics IT Workers Need to Know - Sagara Asia Blog<\/title>\n<meta name=\"description\" content=\"Cybersecurity are designed to resist attacks against networked systems and applications, regardless of where the threats originate.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sagaratechnology.com\/blog\/cybersecurity-basics-it-workers-need-to-know\/\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cybersecurity Basics IT Workers Need to Know - Sagara Asia Blog\" \/>\n<meta name=\"twitter:description\" content=\"Cybersecurity are designed to resist attacks against networked systems and applications, regardless of where the threats originate.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/lh6.googleusercontent.com\/zB6G45-UQi43q6mvX82SY1cAN5f4oYmUbo_OTBukxoIDsE-quN68U-6UG-kDdzubn7y8hDiqaZl64AtelxWlswLEwqknslGthRHBtehuvPP8o-xKv7f9nyT4Ottf6am3gl3FUzfLLjt9V1rk6H1gnnE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Syafira Nur Tazkia Abdillah\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Basics IT Workers Need to Know - Sagara Asia Blog","description":"Cybersecurity are designed to resist attacks against networked systems and applications, regardless of where the threats originate.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sagaratechnology.com\/blog\/cybersecurity-basics-it-workers-need-to-know\/","twitter_card":"summary_large_image","twitter_title":"Cybersecurity Basics IT Workers Need to Know - Sagara Asia Blog","twitter_description":"Cybersecurity are designed to resist attacks against networked systems and applications, regardless of where the threats originate.","twitter_image":"https:\/\/lh6.googleusercontent.com\/zB6G45-UQi43q6mvX82SY1cAN5f4oYmUbo_OTBukxoIDsE-quN68U-6UG-kDdzubn7y8hDiqaZl64AtelxWlswLEwqknslGthRHBtehuvPP8o-xKv7f9nyT4Ottf6am3gl3FUzfLLjt9V1rk6H1gnnE","twitter_misc":{"Written by":"Syafira Nur Tazkia Abdillah","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sagaratechnology.com\/blog\/cybersecurity-basics-it-workers-need-to-know\/#article","isPartOf":{"@id":"https:\/\/sagaratechnology.com\/blog\/cybersecurity-basics-it-workers-need-to-know\/"},"author":{"name":"Syafira Nur Tazkia Abdillah","@id":"https:\/\/sagaratechnology.com\/blog\/#\/schema\/person\/8f2cf70c23b8163ad2c53138a38b58b0"},"headline":"Cybersecurity Basics IT Workers Need to Know","datePublished":"2023-02-15T04:23:19+00:00","dateModified":"2023-03-16T04:30:26+00:00","mainEntityOfPage":{"@id":"https:\/\/sagaratechnology.com\/blog\/cybersecurity-basics-it-workers-need-to-know\/"},"wordCount":938,"commentCount":2,"publisher":{"@id":"https:\/\/sagaratechnology.com\/blog\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sagaratechnology.com\/blog\/cybersecurity-basics-it-workers-need-to-know\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sagaratechnology.com\/blog\/cybersecurity-basics-it-workers-need-to-know\/","url":"https:\/\/sagaratechnology.com\/blog\/cybersecurity-basics-it-workers-need-to-know\/","name":"Cybersecurity Basics IT Workers Need to Know - Sagara Asia Blog","isPartOf":{"@id":"https:\/\/sagaratechnology.com\/blog\/#website"},"datePublished":"2023-02-15T04:23:19+00:00","dateModified":"2023-03-16T04:30:26+00:00","description":"Cybersecurity are designed to resist attacks against networked systems and applications, regardless of where the threats originate.","breadcrumb":{"@id":"https:\/\/sagaratechnology.com\/blog\/cybersecurity-basics-it-workers-need-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sagaratechnology.com\/blog\/cybersecurity-basics-it-workers-need-to-know\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sagaratechnology.com\/blog\/cybersecurity-basics-it-workers-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sagaratechnology.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Uncategorized","item":"https:\/\/sagaratechnology.com\/blog\/category\/uncategorized\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity Basics IT Workers Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/sagaratechnology.com\/blog\/#website","url":"https:\/\/sagaratechnology.com\/blog\/","name":"Sagara Asia Blog","description":"Dapatkan Informasi Seputar Teknologi dan Bisnis","publisher":{"@id":"https:\/\/sagaratechnology.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sagaratechnology.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sagaratechnology.com\/blog\/#organization","name":"Sagara Technology","url":"https:\/\/sagaratechnology.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sagaratechnology.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/sagaratechnology.com\/blog\/wp-content\/uploads\/2021\/10\/sagara-logo.jpeg","contentUrl":"https:\/\/sagaratechnology.com\/blog\/wp-content\/uploads\/2021\/10\/sagara-logo.jpeg","width":200,"height":200,"caption":"Sagara Technology"},"image":{"@id":"https:\/\/sagaratechnology.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/sagara-asia\/"]},{"@type":"Person","@id":"https:\/\/sagaratechnology.com\/blog\/#\/schema\/person\/8f2cf70c23b8163ad2c53138a38b58b0","name":"Syafira Nur Tazkia Abdillah","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sagaratechnology.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3e4cdb0cc36f3857c031f09bd895111f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3e4cdb0cc36f3857c031f09bd895111f?s=96&d=mm&r=g","caption":"Syafira Nur Tazkia Abdillah"}}]}},"_links":{"self":[{"href":"https:\/\/sagaratechnology.com\/blog\/wp-json\/wp\/v2\/posts\/3426"}],"collection":[{"href":"https:\/\/sagaratechnology.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sagaratechnology.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sagaratechnology.com\/blog\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/sagaratechnology.com\/blog\/wp-json\/wp\/v2\/comments?post=3426"}],"version-history":[{"count":2,"href":"https:\/\/sagaratechnology.com\/blog\/wp-json\/wp\/v2\/posts\/3426\/revisions"}],"predecessor-version":[{"id":3642,"href":"https:\/\/sagaratechnology.com\/blog\/wp-json\/wp\/v2\/posts\/3426\/revisions\/3642"}],"wp:attachment":[{"href":"https:\/\/sagaratechnology.com\/blog\/wp-json\/wp\/v2\/media?parent=3426"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sagaratechnology.com\/blog\/wp-json\/wp\/v2\/categories?post=3426"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sagaratechnology.com\/blog\/wp-json\/wp\/v2\/tags?post=3426"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}