News

How Safe Are You from Cyber Attacks?
Article date Article date: 03 February 2025
time to read article Time to read article: 3 minutes

How Safe Are You from Cyber Attacks?

Cyber attacks are an ever-present threat, affecting individuals, businesses, and even national security. Our latest Tech Talk, entitled 'How Safe Am I From Cyber Attacks' and presented by Dr. Phil Wilkinson, brought together two cybersecurity experts—Gordon Fong and Dr. Jane Hendriksen-Bulmer—to shed light on the evolving nature of cyber threats, the methods used by attackers, and the importance of proactive security measures.

Understanding Cyber Attacks

A cyber attack refers to any unauthorised attempt to access, damage, or exploit a system, network, or device. The term "cyber" encompasses a vast range of threats, from phishing scams to sophisticated ransomware attacks. Law enforcement and cybersecurity professionals work tirelessly to combat these threats, but awareness and proactive measures remain crucial in staying safe.

The Evolution of Cyber Threats

Cyber attacks have evolved significantly over the years. From early hacking techniques, such as the use of "blue boxes" to manipulate telephone systems, to modern threats like ransomware and AI-driven phishing scams, the landscape is constantly shifting. Attackers exploit vulnerabilities in outdated software, poorly configured security settings, and human psychology to gain access to sensitive data.

One alarming example discussed was an attack where a laser was pointed at a laptop through a window to detect keystrokes. This highlights the unexpected and often sophisticated nature of cyber threats. Another example included a Wi-Fi dongle being used as a keylogger during a cybersecurity lecture, showcasing the ease with which attackers can infiltrate systems.

The Rise of Ransomware

Ransomware is one of the most damaging forms of cyber attacks, where attackers encrypt data and demand payment for its release. The 2017 WannaCry attack, which crippled NHS services, remains one of the most notorious cases. These attacks are often facilitated by open ports on household and enterprise devices, making continuous software updates and security patches essential.

Cybercriminals operate within a highly structured economy, often offering "ransomware-as-a-service" to less technical individuals. Gordon Fong emphasised the importance of reporting cyber crimes to law enforcement to improve response strategies and provide better support to victims.

Human Vulnerabilities and Social Engineering

Despite advancements in security technology, human error remains the weakest link in cybersecurity. Phishing and social engineering attacks exploit trust and familiarity, tricking individuals into revealing sensitive information. A striking example shared involved a business nearly losing £15,000 due to a sophisticated phishing scam.

To combat these threats, the panel recommended using strong, unique passwords, enabling two-factor authentication, and being cautious with unsolicited emails and messages. The importance of cybersecurity education was also highlighted, urging individuals and businesses to adopt proactive security measures.

Practical Cybersecurity Measures

  1. Update Software Regularly: Keep all software and operating systems updated to patch vulnerabilities.

  2. Use Strong Passwords: Avoid reusing passwords and consider using a password manager.

  3. Enable Two-Factor Authentication (2FA): Adds an extra layer of security.

  4. Verify Requests: Be cautious of emails or calls requesting sensitive information; verify their authenticity.

  5. Report Cyber Crimes: Reporting incidents helps authorities track and combat cyber threats.

The Role of AI in Cybersecurity

Artificial intelligence plays a dual role in cybersecurity. While AI is used to detect vulnerabilities and strengthen defences, attackers also leverage AI to create more convincing phishing scams and automate attacks. Continuous adaptation and vigilance are necessary to stay ahead of emerging threats.

Conclusion

Cybersecurity is an ongoing battle that requires awareness, education, and proactive measures. The Tech Talk emphasised the need for individuals and businesses to take responsibility for their digital security, reporting incidents and implementing best practices to mitigate risks. As cyber threats continue to evolve, staying informed and prepared is the best defence against cyber attacks.


Related articles