Overcoming the challenges of cybersecurity awareness

The range of threats in the Internet space is enormous and does not tend to decrease. New technologies, with their diversity in the structure, contribute to the continuous emergence of new vulnerabilities, and thus new threats to privacy, confidential data, and availability of services.

In such circumstances, all information technology users should regularly improve their understanding and attitude towards the safe use of these information technologies. Besides the technical measures for securing the data, which is processed in the IT infrastructure, the training of all personnel in understanding the threats that can arise from working with IT devices, is a necessity.

Large-scale technical measures contribute to the protection of our data, these measures are accurate, timely, comprehensive, and respond very well when are well managed. But the human factor is not excluded from the impact on these technical measures. Human virtues and flaws play a major role in the implementation of effective cybersecurity. It is the flaws that can contribute to the occurrence of vulnerabilities even in a perfectly designed technical system, intended to protect the information in cyberspace. The saying “The chain is as strong as its weakest link” best reflects the need for continuous improvement of cyber awareness.

When working with IT devices, people’s reaction is fast and reckless, almost as a conditioned reflex of the content they see. As a result, malicious emails are unknowingly opened, malicious links are clicked on web pages, and content that would otherwise remain private is shared. This behavior makes them vulnerable to cyber threats. The tendency to change people’s habits cannot be done overnight. This process must take planning and implementation of different measures and activities. The result should be increased awareness of the threats in cyberspace. Depending on the needs and conditions for implementation, the measures and activities that can result in increased cyber awareness can be taken in the short and long term.

The transition to an information society, with full digitalization, means preparing the institutions, businesses, and citizens for life and work within that society. The educational process is one of the pillars of that transformation. Good educational programs can help in preparation for the successful functioning of the digitally connected world. Besides others, these programs should include training on protection from threats in cyberspace. The educational process in the early school-age of children, through practical examples, can point to the threats that lurk on the Internet, such as misrepresentation, data theft, installation of malicious programs, misinformation, etc. Older children must be trained in recognizing and dealing with cyberbullying, financial fraud, cyber predators, sextortion, publishing content that will cause them problems in the future, etc.

Certainly, successful cooperation at the institutional level in a country would seriously affect the development of cyber awareness. The cooperation must include specific activities between the state bodies (ministries, agencies), local level bodies, educational institutions, as well as the non-governmental and private sector, to ensure the best possible continuous training of the citizens. In that direction, and with the accomplishment of various workshops, exercises, seminars, and conferences, we can increase awareness of threats in cyberspace and improve cooperation at the institutional level to deal with those threats. This approach reduces the gap between the institutions, enables the establishment of networks of contacts, improves the exchange of information, and strengthens the mutual trust of the staff. In that way, a stronger (integrated) institutional infrastructure is formed that knows how to recognize a threat in cyberspace and take measures to eliminate it.

Considering that over 82% of people in the Republic of North Macedonia are users of some of the social networks, it is clear that they are most vulnerable to threats in cyberspace through these platforms. Social networks are advertised as friendly and fun networks that are providing an easy and simple way to communicate, exchange pictures/videos and news. Such openness and easy access contribute to unprepared joining to social networks from many people. In such a case, without prior knowledge of the platforms, private and confidential information is easily shared, which, if they end up in the wrong hands, can easily be misused. Additionally, these users also become vulnerable to disinformation campaigns, often for political purposes. Therefore, just as social networks allow easy connections to their platforms, they should also have a simple interface for training new users in the consequences of using the social network. They should enable fast and intuitive management of the information that is posted/shared on the network platform.

Media campaigns are a great way to stay focused on the problems that arise in cyberspace. Whether aimed at children, young people, or the adult generation, media campaigns can help maintain attention and continuity in dealing with cyber threats. In this way, directly, through campaigns that show measures to eliminate threats in cyberspace, and subtly, through constant reporting of perceived problems, awareness of the risks in cyberspace can be maintained.

There is no doubt that the development of the information society will renew the old ones, but will also bring new, more modern threats in cyberspace. Dealing with those threats is a complex problem that should involve different entities and of course their aspects. Awareness of the threats in cyberspace must become part of our daily lives, we must live with it, notice the threats, and take measures to manage them.

This article is supported by the Metamorphosis Foundation and Techsoup. The views expressed in this publication are those of the author and do not always reflect the views of the Metamorphosis Foundation, Techsoup and C3I.

Source: Cyber Security, Corporate Security and Crisis Management Initiative

Share:

28934
meta tim sliki-02.jpg

Goce

Stevanoski,

MSc

Author has a master’s degree in information science – computer engineering, C3I member, working in cybersecurity, computer networks, telecommunication, and system administration.

Other blog texts

Open Data – when supply and demand meet halfway

24.11.2021

The concept of open data rests on the principle of open access, serving the public good by empowering citizens, boosting businness and informing social development. In North Macedonia, the concept of open data was introduced and promoted with the country’s membership in the Open Government Partnership in 2011. Consequently, in 2014 the Law on the […]

ADMs, AI and human rights: does your algorithm respect privacy?

23.11.2021

Goce Arsovski

e-Participation: Regional Perspectives - Local Actions

23.11.2021

Digital innovation radically transforms democratic decision-making and citizen participation in social change. As witnesses to the global Covid-19 pandemic, we can see how public administrations in the region and the EU, planned or sporadically, are increasingly experimenting with creating Internet platforms or digital tools to enable citizens to access relevant public information they need, as […]

"Portalb: What steps should you take to obtain an electronic birth certificate" - News Agency Meta.mk

05.11.2021

Obtaining documents with a physical presence, i.e. at the counters, costs people time, money and nerves. This was shown by the research on Portalb, where a birth certificate, which can be obtained in 5 minutes, was waited for a week, due to the inefficiency of the administration. Undoubtedly, digitalization is a solution to put an […]

"Birth certificates older than 6 months shall be accepted, decided the Office for Management of Registers following the Portalb.mk research” – News Agency Meta.mk

03.11.2021

Photo: Suad Bajrami, Portalb.mk The Office for Management of Registers informs that it has issued a decision to accept birth certificates older than six months. This was stated after Portalb.mk published the research in which citizens complained, and the Office confirmed, that they were asked for certificates not older than six months. With the new […]

"Portalb: It is illegal to ask citizens to pay for new certificates not older than 6 months" - Meta.mk

29.10.2021

The first page of the birth certificate and the seal on the back; Photo: Suad Bajrami, Portalb.mk “It is not valid, the certificate must not be older than six months.” Of course, many of you have come across such answers from the institutions where you had to submit a birth certificate and you have wondered […]