Overcoming the challenges of cybersecurity awareness

The range of threats in the Internet space is enormous and does not tend to decrease. New technologies, with their diversity in the structure, contribute to the continuous emergence of new vulnerabilities, and thus new threats to privacy, confidential data, and availability of services.

In such circumstances, all information technology users should regularly improve their understanding and attitude towards the safe use of these information technologies. Besides the technical measures for securing the data, which is processed in the IT infrastructure, the training of all personnel in understanding the threats that can arise from working with IT devices, is a necessity.

Large-scale technical measures contribute to the protection of our data, these measures are accurate, timely, comprehensive, and respond very well when are well managed. But the human factor is not excluded from the impact on these technical measures. Human virtues and flaws play a major role in the implementation of effective cybersecurity. It is the flaws that can contribute to the occurrence of vulnerabilities even in a perfectly designed technical system, intended to protect the information in cyberspace. The saying “The chain is as strong as its weakest link” best reflects the need for continuous improvement of cyber awareness.

When working with IT devices, people’s reaction is fast and reckless, almost as a conditioned reflex of the content they see. As a result, malicious emails are unknowingly opened, malicious links are clicked on web pages, and content that would otherwise remain private is shared. This behavior makes them vulnerable to cyber threats. The tendency to change people’s habits cannot be done overnight. This process must take planning and implementation of different measures and activities. The result should be increased awareness of the threats in cyberspace. Depending on the needs and conditions for implementation, the measures and activities that can result in increased cyber awareness can be taken in the short and long term.

The transition to an information society, with full digitalization, means preparing the institutions, businesses, and citizens for life and work within that society. The educational process is one of the pillars of that transformation. Good educational programs can help in preparation for the successful functioning of the digitally connected world. Besides others, these programs should include training on protection from threats in cyberspace. The educational process in the early school-age of children, through practical examples, can point to the threats that lurk on the Internet, such as misrepresentation, data theft, installation of malicious programs, misinformation, etc. Older children must be trained in recognizing and dealing with cyberbullying, financial fraud, cyber predators, sextortion, publishing content that will cause them problems in the future, etc.

Certainly, successful cooperation at the institutional level in a country would seriously affect the development of cyber awareness. The cooperation must include specific activities between the state bodies (ministries, agencies), local level bodies, educational institutions, as well as the non-governmental and private sector, to ensure the best possible continuous training of the citizens. In that direction, and with the accomplishment of various workshops, exercises, seminars, and conferences, we can increase awareness of threats in cyberspace and improve cooperation at the institutional level to deal with those threats. This approach reduces the gap between the institutions, enables the establishment of networks of contacts, improves the exchange of information, and strengthens the mutual trust of the staff. In that way, a stronger (integrated) institutional infrastructure is formed that knows how to recognize a threat in cyberspace and take measures to eliminate it.

Considering that over 82% of people in the Republic of North Macedonia are users of some of the social networks, it is clear that they are most vulnerable to threats in cyberspace through these platforms. Social networks are advertised as friendly and fun networks that are providing an easy and simple way to communicate, exchange pictures/videos and news. Such openness and easy access contribute to unprepared joining to social networks from many people. In such a case, without prior knowledge of the platforms, private and confidential information is easily shared, which, if they end up in the wrong hands, can easily be misused. Additionally, these users also become vulnerable to disinformation campaigns, often for political purposes. Therefore, just as social networks allow easy connections to their platforms, they should also have a simple interface for training new users in the consequences of using the social network. They should enable fast and intuitive management of the information that is posted/shared on the network platform.

Media campaigns are a great way to stay focused on the problems that arise in cyberspace. Whether aimed at children, young people, or the adult generation, media campaigns can help maintain attention and continuity in dealing with cyber threats. In this way, directly, through campaigns that show measures to eliminate threats in cyberspace, and subtly, through constant reporting of perceived problems, awareness of the risks in cyberspace can be maintained.

There is no doubt that the development of the information society will renew the old ones, but will also bring new, more modern threats in cyberspace. Dealing with those threats is a complex problem that should involve different entities and of course their aspects. Awareness of the threats in cyberspace must become part of our daily lives, we must live with it, notice the threats, and take measures to manage them.

This article is supported by the Metamorphosis Foundation and Techsoup. The views expressed in this publication are those of the author and do not always reflect the views of the Metamorphosis Foundation, Techsoup and C3I.

Source: Cyber Security, Corporate Security and Crisis Management Initiative


meta tim sliki-02.jpg




Author has a master’s degree in information science – computer engineering, C3I member, working in cybersecurity, computer networks, telecommunication, and system administration.

Other blog texts

A short review of the EU regulative for online disinformation


Disinformation causes many harmful societal consequences, such as, poses security threats; erodes the election system and process; it undermines the trust in the institutions; and, legally, it represents hampering of the freedom of opinion and expression – a fundamental right sanctified in the Charter of Fundamental Rights of the European Union. Recognizing that the fight […]

The impact of the 5G disinformation during the Covid19 crisis


We live in a time of unseen technological advances, innovations and scientific discoveries, especially in information and communication technologies (ICT), where the implementation and use of the 5G network worldwide can be singled out. At the time of the 5G implementation around the world, because it coincided with the spread of the COVID-19 virus and […]

ACTA - Active citizens take action


Analysis: In the IT sector in North Macedonia, the gap between men and women almost non-existent


Unlike other industrial sectors in the Macedonian economy, the IT sector stands out as the one where the gap between men and women is almost non-existent. In some industries, such as digital marketing, the ratio is 55.56% percent women versus 44.44% percent men. Over the years, the number of women graduates in formal education is […]

Регионална анализа за ефектите од ковид-19 врз медиумите од Западен Балкан


Keith Brown: Critical thinking demands recognition of one’s own blinkers, prejudices and areas of ignorance


“Balkan history has been shaped by the territorial ambitions and disputes of the last century, and so has become a zero-sum game; it also has quasi-religious aspects, insofar as current debates reveal an implicit concern with purity and pollution underlying accusations around loyalty and betrayal. Grievances and disputes escalate; and (to pursue the game metaphor) there is no mechanism, in this case, by which both sides would agree to invest a referee with the authority to call the game fairly; the stakes are seen as too high,” says prof. Keith Brown in this interview for CriThink.mk, which Meta News Agency republishes, in a conversation about the role of critical thinking in science, and particularly in the study of history.