aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • Data
  • Technology

October Is Cybersecurity Awareness Month! Why Being Cyber‑Smart Matters

  • root
  • October 8, 2021
  • 3 minute read

The month of October is associated with a variety of themes, but it also ushers in the start of autumn and pumpkin-spiced lattes and culminates with one of the scariest days of the year – Halloween. However, beyond the uptick in Starbucks stock prices and the sale of costumes, October is marked as Cybersecurity Awareness Month in the United States and European Cybersecurity Month on “the old continent”.

While the average person may think that they have a fairly decent grasp on cybersecurity with properly developed habits and impeccable cyber-hygiene practices, the reality is that we don’t have to look far for proof of the opposite – the annual roundups of most common passwords paint a rather ghastly picture; just take a look at the worst passwords of 2020, for example.


Partner with aster.cloud
for your next big idea.
Let us know here.



From our partners:

CITI.IO :: Business. Institutions. Society. Global Political Economy.
CYBERPOGO.COM :: For the Arts, Sciences, and Technology.
DADAHACKS.COM :: Parenting For The Rest Of Us.
ZEDISTA.COM :: Entertainment. Sports. Culture. Escape.
TAKUMAKU.COM :: For The Hearth And Home.
ASTER.CLOUD :: From The Cloud And Beyond.
LIWAIWAI.COM :: Intelligence, Inside and Outside.
GLOBALCLOUDPLATFORMS.COM :: For The World's Computing Needs.
FIREGULAMAN.COM :: For The Fire In The Belly Of The Coder.
ASTERCASTER.COM :: Supra Astra. Beyond The Stars.
BARTDAY.COM :: Prosperity For Everyone.

Additionally, the world has never been more connected when it comes to tech and the number of new digital technologies will just increase over the years; that’s why cybersecurity (and being cyber-smart) matters. By committing to these campaigns, countries are helping foster proper cybersecurity habits in their citizens and so help them protect their valuable data and become more responsible netizens.

After all, better cybersecurity is a collective responsibility, and by adopting proper cyber-hygiene practices, both in our work and personal lives, we are making sure that cybercriminals have fewer entry points into devices, thus shrinking the threat landscape.

 

The risks of underestimating cybersecurity

If you’re skeptical about how that works, here are a few examples for illustration. If you don’t adopt these habits as part of your personal life and, for example, keep on recycling passwords, in the worst case scenario, a bad actor will gain access to your personal data and could potentially commit identity theft, clean out your accounts, damage your reputation and credit, and that is just the tip of the iceberg. The immediate impact is on you and probably your loved ones.

Read More  Google Cloud Next 2019 | How to Make Enterprise Search More Effective with Google Cloud Search

Moving on to the professional side of things, having lax cybersecurity habits in a work environment can be detrimental to thousands of people. That goes double for people who are part of critical infrastructure. The Colonial Pipeline attack particularly stands out in recent memory; one pilfered password allowed bad actors to get a foothold in the system and shut it down with ransomware. In another case, a hacker attempted to poison the water supply in a city in Florida. And let’s not forget about all the healthcare facilities that were hit by ransomware and couldn’t provide patients with proper treatment.

Most of these incidents could have been averted if proper cybersecurity measures had been implemented and people had been cyber-smart.

 

How to #BeCyberSmart

So how do you start taking cybersecurity seriously and be cyber-smart? Well, as clichéd as it may sound, one of the best things you can do is getting the basics right.

That means when it comes to passwords, you should definitely opt for a strong passphrase rather than a simple password you can easily memorize, and you should always do your best to avoid the cardinal sins of password creation. If you’re the type of person who has dozens upon dozens of passwords, you’d probably do well to use a password manager, which will simplify the whole task of creating and memorizing passwords to remembering just one.

Once you have your passwords locked down like Fort Knox, you should consider adding an extra layer of security by using multifactor authentication, which can take on various forms from code-generating apps to hardware keys and biometrics.

Read More  Deutsche Telekom And Google Cloud Sign Partnership Agreement Focused On Network Transformation

Securing your devices is another thing you should never underestimate; therefore, always keep them clean, up-to-date by applying all patches in a timely manner, and use a reputable security solution that will protect you against most threats you might encounter.

And while technology can take you far, don’t forget to keep your wits about you. That means that you should approach everything you see online, be it on social media or in your email, with a healthy dose of skepticism. So be wary of clicking on any links or following any offers that seem even remotely off-kilter.

 

Final thoughts

Keep in mind that while these campaigns run just for the duration of this month, cybersecurity awareness is a year-round affair. You should never let your guard down, and make sure to keep applying your cybersecurity knowledge to all online interactions. And now that you’ve got the basics down, you have bigger phish to fry. So, stay tuned for the second week of October where we take a closer look at how you can “phight the phish”. Also, be sure to learn more about the campaign and check out its weekly themes on StaySafeOnline.org.


For enquiries, product placements, sponsorships, and collaborations, connect with us at [email protected]. We'd love to hear from you!

Our humans need coffee too! Your support is highly appreciated, thank you!

root

Related Topics
  • BeCyberSmart
  • Cybersecurity
  • Passwords
  • Security
  • Technology
You May Also Like
View Post
  • Computing
  • Multi-Cloud
  • Technology

Reliance on US tech providers is making IT leaders skittish

  • May 28, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Examine the 4 types of edge computing, with examples

  • May 28, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

AI and private cloud: 2 lessons from Dell Tech World 2025

  • May 28, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

TD Synnex named as UK distributor for Cohesity

  • May 28, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Broadcom’s ‘harsh’ VMware contracts are costing customers up to 1,500% more

  • May 28, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Weigh these 6 enterprise advantages of storage as a service

  • May 28, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Pulsant targets partner diversity with new IaaS solution

  • May 23, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Growing AI workloads are causing hybrid cloud headaches

  • May 23, 2025

Stay Connected!
LATEST
  • 1
    Just make it scale: An Aurora DSQL story
    • May 29, 2025
  • 2
    Reliance on US tech providers is making IT leaders skittish
    • May 28, 2025
  • Examine the 4 types of edge computing, with examples
    • May 28, 2025
  • AI and private cloud: 2 lessons from Dell Tech World 2025
    • May 28, 2025
  • 5
    TD Synnex named as UK distributor for Cohesity
    • May 28, 2025
  • Weigh these 6 enterprise advantages of storage as a service
    • May 28, 2025
  • 7
    Broadcom’s ‘harsh’ VMware contracts are costing customers up to 1,500% more
    • May 28, 2025
  • 8
    Pulsant targets partner diversity with new IaaS solution
    • May 23, 2025
  • 9
    Growing AI workloads are causing hybrid cloud headaches
    • May 23, 2025
  • Gemma 3n 10
    Announcing Gemma 3n preview: powerful, efficient, mobile-first AI
    • May 22, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • Understand how Windows Server 2025 PAYG licensing works
    • May 20, 2025
  • By the numbers: How upskilling fills the IT skills gap
    • May 21, 2025
  • 3
    Cloud adoption isn’t all it’s cut out to be as enterprises report growing dissatisfaction
    • May 15, 2025
  • 4
    Hybrid cloud is complicated – Red Hat’s new AI assistant wants to solve that
    • May 20, 2025
  • 5
    Google is getting serious on cloud sovereignty
    • May 22, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.