{"id":143694,"date":"2021-10-11T10:36:33","date_gmt":"2021-10-11T07:36:33","guid":{"rendered":"https:\/\/www.enerjigazetesi.ist\/?p=143694"},"modified":"2021-10-11T10:40:31","modified_gmt":"2021-10-11T07:40:31","slug":"ekim-ayi-avrupa-da-siber-guvenlik-ayi-olarak-kutlaniyor","status":"publish","type":"post","link":"https:\/\/www.enerjigazetesi.ist\/en\/ekim-ayi-avrupa-da-siber-guvenlik-ayi-olarak-kutlaniyor\/","title":{"rendered":"October is Cybersecurity Awareness Month!"},"content":{"rendered":"<p><\/p>\n<h2>The month of October is associated with a variety of themes, but it also ushers in the start of autumn and pumpkin-spiced lattes and culminates with one of the scariest days of the year \u2013 Halloween. However, beyond the uptick in Starbucks stock prices and the sale of costumes, October is marked as\u00a0<a href=\"https:\/\/www.cisa.gov\/cybersecurity-awareness-month\" target=\"_blank\" rel=\"noopener\">Cybersecurity Awareness Month<\/a>\u00a0in the United States and\u00a0<a href=\"https:\/\/cybersecuritymonth.eu\/\" target=\"_blank\" rel=\"noopener\">European Cybersecurity Month<\/a>\u00a0on \u201cthe old continent\u201d.<\/h2>\n<p>While the average person may think that they have a fairly decent grasp on cybersecurity with properly developed habits and impeccable cyber-hygiene practices, the reality is that we don\u2019t have to look far for proof of the opposite \u2013 the annual roundups of most common passwords paint a rather ghastly picture; <img loading=\"lazy\" class=\"alignright wp-image-143696\" src=\"https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2021\/10\/ekim-ayi-avrupa-da-siber-guvenlik-ayi-olarak-kutlaniyor-1.jpg\" alt=\"\" width=\"320\" height=\"213\" srcset=\"https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2021\/10\/ekim-ayi-avrupa-da-siber-guvenlik-ayi-olarak-kutlaniyor-1.jpg 550w, https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2021\/10\/ekim-ayi-avrupa-da-siber-guvenlik-ayi-olarak-kutlaniyor-1-300x200.jpg 300w, https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2021\/10\/ekim-ayi-avrupa-da-siber-guvenlik-ayi-olarak-kutlaniyor-1-500x333.jpg 500w, https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2021\/10\/ekim-ayi-avrupa-da-siber-guvenlik-ayi-olarak-kutlaniyor-1-75x50.jpg 75w, https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2021\/10\/ekim-ayi-avrupa-da-siber-guvenlik-ayi-olarak-kutlaniyor-1-450x300.jpg 450w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/>just take a look at the\u00a0<a href=\"https:\/\/www.welivesecurity.com\/2020\/11\/19\/worst-passwords-2020-is-it-time-change-yours\/\">worst passwords of 2020<\/a>, for example.<\/p>\n<p>Additionally, the world has never been more connected when it comes to tech and the number of new digital technologies will just increase over the years; that\u2019s why cybersecurity (and being cyber-smart) matters. By committing to these campaigns, countries are helping foster proper cybersecurity habits in their citizens and so help them protect their valuable data and become more responsible netizens.<\/p>\n<p>After all, better cybersecurity is a collective responsibility, and by adopting proper cyber-hygiene practices, both in our work and personal lives, we are making sure that cybercriminals have fewer entry points into devices, thus shrinking the threat landscape.<\/p>\n<h2>The risks of underestimating cybersecurity<\/h2>\n<p>If you\u2019re skeptical about how that works, here are a few examples for illustration. If you don\u2019t adopt these habits as part of your personal life and, for example, keep on\u00a0<a href=\"https:\/\/www.welivesecurity.com\/2020\/05\/28\/people-know-reusing-passwords-risky-most-do-it-anyway\/\">recycling passwords<\/a>, in the worst case scenario, a bad actor will gain access to your personal data and could potentially commit identity theft, clean out your accounts, damage your reputation and credit, and that is just the tip of the iceberg. The immediate impact is on you and probably your loved ones.<\/p>\n<p>Moving on to the professional side of things, having lax cybersecurity habits in a work environment can be detrimental to thousands of people. That goes double for people who are part of critical infrastructure.\u00a0<a href=\"https:\/\/www.welivesecurity.com\/2021\/05\/19\/colonial-pipeline-attack-hacking-physical-world\/\" target=\"_blank\" rel=\"noopener\">The Colonial Pipeline attack<\/a>\u00a0particularly stands out in recent memory; one pilfered password allowed bad actors to get a foothold in the system and shut it down with ransomware. In another case, a hacker attempted to poison\u00a0<a href=\"https:\/\/www.welivesecurity.com\/2021\/02\/09\/hacker-attempts-poison-florida-city-water-supply\/\" target=\"_blank\" rel=\"noopener\">the water supply in a city in Florida<\/a>. And let\u2019s not forget about all the healthcare facilities that were hit by ransomware and couldn\u2019t provide patients with proper treatment.<\/p>\n<p>Most of these incidents could have been averted if proper cybersecurity measures had been implemented and people had been cyber-smart.<\/p>\n<h2><span lang=\"EN-US\">How to #BeCyberSmart<\/span><\/h2>\n<p>So how do you start taking cybersecurity seriously and be cyber-smart? Well, as clich\u00e9d as it may sound, one of the best things you can do is getting the basics right.<\/p>\n<p>That means when it comes to passwords, you should definitely opt for a\u00a0<a href=\"https:\/\/www.welivesecurity.com\/2016\/05\/05\/forget-about-passwords-you-need-a-passphrase\/\" target=\"_blank\" rel=\"noopener\">strong passphrase<\/a>\u00a0rather than a simple password you can easily memorize, and you should always do your best to avoid the\u00a0<a href=\"https:\/\/www.welivesecurity.com\/2020\/05\/07\/5-common-password-mistakes-you-should-avoid\/\" target=\"_blank\" rel=\"noopener\">cardinal sins of password creation<\/a>. If you\u2019re the type of person who has dozens upon dozens of passwords, you\u2019d probably do well to use a\u00a0<a href=\"https:\/\/www.welivesecurity.com\/2020\/06\/26\/what-is-password-manager-why-is-it-useful\/\" target=\"_blank\" rel=\"noopener\">password manager<\/a>, which will simplify the whole task of creating and memorizing passwords to remembering just one.<\/p>\n<p>Once you have your passwords locked down like Fort Knox, you should consider adding an extra layer of security by using\u00a0<a href=\"https:\/\/www.welivesecurity.com\/2019\/12\/13\/2fa-double-down-your-security\/\" target=\"_blank\" rel=\"noopener\">multifactor authentication<\/a>, which can take on various forms from code-generating apps to hardware keys and biometrics.<\/p>\n<p>Securing your devices is another thing you should never underestimate; therefore, always keep them clean, up-to-date by applying all patches in a timely manner, and use a reputable security solution that will protect you against most threats you might encounter.<\/p>\n<p>And while technology can take you far, don\u2019t forget to keep your wits about you. That means that you should approach everything you see online, be it on social media or in your email, with a healthy dose of skepticism. So be wary of clicking on any links or following any offers that seem even remotely off-kilter.<\/p>\n<h2>Final thoughts<\/h2>\n<p>Keep in mind that while these campaigns run just for the duration of this month, cybersecurity awareness is a year-round affair. You should never let your guard down, and make sure to keep applying your cybersecurity knowledge to all online interactions. And now that you\u2019ve got the basics down, you have bigger phish to fry. So, stay tuned for the second week of October where we take a closer look at how you can \u201cphight the phish\u201d.<\/p>","protected":false},"excerpt":{"rendered":"<p>The month of October is associated with a variety of themes, but it also ushers in the start of autumn and pumpkin-spiced lattes and culminates with one of the scariest days of the year \u2013 Halloween. However, beyond the uptick in Starbucks stock prices and the sale of costumes, October is marked as\u00a0Cybersecurity Awareness Month\u00a0in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":143697,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[53,157],"tags":[97412,97415,97411,97416,97417,97419,97418,97414,44468,44450,97420,16303,90489,97413,52056,42460,3176,97410],"views":114,"_links":{"self":[{"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/posts\/143694"}],"collection":[{"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/comments?post=143694"}],"version-history":[{"count":1,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/posts\/143694\/revisions"}],"predecessor-version":[{"id":143699,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/posts\/143694\/revisions\/143699"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/media\/143697"}],"wp:attachment":[{"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/media?parent=143694"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/categories?post=143694"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/tags?post=143694"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}