In today’s society technology isadvancing at a fast rate where almost everyone is able to connect with othersfrom across the globe in just a click of a button.

Most important, documentsare in a “cloud” where you are able to access it easily on any device insteadof the old fashion piece of “paper”. But, most people stop to realize howunsecure their personal information is, the more advanced technology isbecoming the more unsecure your personal information. Now, there are multiplepeople who can have illegal access information and it’s happening every min.Technology has became a necessity to our daily lives making everything easierand faster to connect with others but there are a lot of dangers that come withit such as cyber-attacks.        Cybercrimes are done by individuals whoare called “hackers”.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Hackers are individuals who seek computer system attacks.The hackers are able to see of any form of IT devices such as computers,phones, tablets and many other things as well. Most hackers do most of theirwork from the comfort of their home behind a computer screen at any time theyplease.

(Wikipedia)     Hackers can happen when you least expectit, cyber-attacks are malicious acts usually originating from anonymous sourcesthat either steal, alter or destroy a specific data file in the computersystem. (Definition of Cyber-attack)Everyone is effected by cyber-attacks allover the world because technology is advancing in today’s society.Definingthe Problem      The main reasons why this problem won’tgo away is because the more advanced technology is becoming the easier we aremaking it for cyber-attackers (hackers) to access our data files.

Many reasonswhy we are making things easier for cyber-attackers to break into our computersystems are because we are not persistent when it comes to knowing what, when,where, why, and how is our data being used, we are lacking in data protectionand use weak passwords. We are all irresponsible when it comes to the simpleprocedures used to keep our data protected, we should always know where we aresending our data files. Just in case if something was to go wrong with the datafile we could be able to know exactly where to find it and how to stop itimmediately.       Encryption of data will not be effectivealone, there needs to be persistency for data security. The act of sending out ourinformation is giving the receiver full control over it, when you send out anydata files to someone without protecting it you are basically giving them the permissionto alter anything on that document giving them part ownership of the document.Some people may even revise the document in a way to harm or threaten youbecause the document came from your IP address, misuse of technology Thehackers then use their knowledge to hack into computers and steal     Now, most credit card users would not expecttheir personal information to be stolen from a common restaurant like JimmyJohn’s, a sandwich franchise.  Thesandwich franchise both corporate and franchised locations were affected by adata breach in approximately 216 locations, the hacker was able to obtain 56million credit and debit cards. No individual would expect their favoriterestaurant to be a cause of their personal information being stolen.

Beingaware and constantly checking your bank statements on your card decreases yourchances of being affected by the cyber-attacks. Being persistent with who,what, when and where can make cyber security more effective and cyber-attackspreventable.      Protecting your personal informationdecreases your chances of being a victim of a cyber-attack, and using passwordsis one of the many ways of keeping hackers out. When it comes down to creatinga password everyone likes to get creative and critical to ensure their accountand information is sealed from outsiders. Spoofing attack is a much fasterprocess using a program, system or website to falsify data which is treated asa trusted system to give the hacker full granted access to enter into yourpersonal information and accounts. (Hackers,Wikipedia.com)      Solutions and Procedures   It is almost impossible to avoid being avictim of cybercrimes completely because everyone is a user of some form oftechnology device and most of important information stored on some computersystem. Which makes hackers have multiple ways of accessing different informationfrom all over the world.

There are ways to prevent and or decrease your chancesof becoming a victim, users must install and keep up-to-date antivirusprograms, firewalls and spyware checkers. Along with keeping them up to date,users must make sure that they run the scans regularly. **Persistent control addsa bonus to relocating data on any device, thus preventing any misuse, alsogiving you awareness the location of your data file if any cyber-attacks wereto occur. Being persistent about the whereabouts of what, when, and where yourinformation is being used helps authorities to stop the attack before any realdamage is done.

     There are many companies out there thatprovide free software, but there are other you can purchase, along with that ofthe many produced by the leading companies providers; in addition, thosecompanies provide free version of their paid or subscription antivirussoftware. Encryption of information that you do not want anyone to haveunauthorized access to is a good way to avoid some cybercrimes; informationsuch as password and credit card information for example. Encryption softwareruns your data through encryption algorithms to make it unintelligible toanyone who tries to hack into your computer.Another good precautionis to be weary of who you divulge your personal information to.

Try to avoidunknown websites, in particular those that ask for your name, mailing address,bank account number or social security number. When doing online shopping makesure website is secure, look for urls that starts with “https”and/or have theTrustee or VeriSign seal. If you do not see these anywhere on the site, you runthe risk of submitting credit card information and other personal informationto a site that maybe a fraud.Conclusion       In conclusion, cyber-crimes will alwaysbe a continuous crime that will be hard to stop completely but there are manyways to make sure you are not a victim of a cyber-attack and your personalinformation is protected. The everyday users and big companies need to beeducated on the new programs and software to help prevent and protect the datafiles storage.

Being aware and persistent are the basic procedures.     Nevertheless,business should employ practices where their employees follow proper safetypractices to ensure that integrity and confidentially of stored information iskept at all times to combat cybercrimes. Safety practices like ensuring thatstaying off game sites on company time where viruses can be downloaded,forwarding chain emails, leaving workstation unattended or password sharingover virtual mediums should be prohibited. With all these safety practices