Security is a major topic of concern these days especially with the escalating cases and threats from terrorists and other lawbreakers who continue to stain the peaceful environment we ought to be enjoying. Security breaches at work or homes may be geared by various motives some of which we have the power to control. The Realest of the threats has come with the tremendous technological advancements which have continued to belittle the previous generations (Milhorn, 2007). Cybercrimes have become a major menace to the society with the hacking of electronic devices, including bank records, becoming a threat to reckon with every day on a global scale.
The anonymity, convenience, and speed the modern technology has given these online predators have created favorable conditions to organize and conduct these crimes via the internet. The unsuspecting citizens may share some information willingly but unsuspectingly, or it might as well be extracted from their digital records. Hackers crack log in details, and once they have gained access, your case is as good as gone (Milhorn, 2007). They clean wipe your bank accounts and other linked ones or may just tarnish your name especially on social the media platform. In other cases, they steal and personalize your identity. The Federal Bureau of Investigation just questions if the community is ready to handle the cons that come with this technological error (FBI, 2016)
At this rate, these measures will require urgent implication to try and curb this uprising force before it gets out of hand. They will also try to prevent it from occurring again or just reduce casualties in case they occur:
1. Choose strong passwords- passwords you decide to use should not be easy for hackers to guess. They have developed programs which use certain metrics provided with simple basic details such as birthdays, pet or spouse names to automatically guess your password. A strong password should contain at least eight characters, a number, a symbol and both lower and uppercase letters. As a safety precaution also, use different passwords for different sites. While on the same, it is important to avoid replying to spam emails and leaving your accounts without logging out (Norton, 2016).
2. Secure your computer- make sure your computer is equipped with the latest patches and updating software which alert you even of the mere attempt by a hacker to access your information. To attain this valuable tool, update your old software which might be vulnerable to attack with more advanced ones which seal the loopholes of a falling victim of a hacking raid. Watch also the sites you visit which will mostly dictate the kind of information you are likely to give out. Sending sensitive information via the internet might also make you a possible target especially by hackers who intervene and read emails (Milhorn, 2007).
Despite attempts by software developers to outsmart hackers and create un-hack able programs, the hackers also appear to have sworn to remain on their toes and prove they cannot be defeated. This underground war has left the innocent civilian exposed to suffer the collateral damage of the war. Without much to do to protect themselves, civilians remain in fear of this imminent threat. Not knowing which account will be hit next. All they can do is take measures that might push their luck to another day.
Video link
A YouTube link on how the FBI are fighting cyber crimes https://www.youtube.com/redirect?q=http%3A%2F%2Ffora.tv%2F2009%2F10%2F07%2FFBI_in_the_Virtual_World_Robert_S_Mueller_III&redir_token=1nDpaqcgJ4NtyE2nTAOHaE2VrO98MTQ2NzI4OTk0NUAxNDY3MjAzNTQ1
References
FBI (2016). Cyber Crime. Retrieved from https://www.fbi.gov/about-us/investigate/cyber
Milhorn, H. (2007). Cybercrime. Boca Raton, Fla.: Universal Publishers.
Norton (2016). Cybercrime - Cybercrime Prevention Tips. Retrieved from http://us.norton.com/cybercrime-prevention