Overcoming the challenges of cybersecurity awareness

The range of threats in the Internet space is enormous and does not tend to decrease. New technologies, with their diversity in the structure, contribute to the continuous emergence of new vulnerabilities, and thus new threats to privacy, confidential data, and availability of services.

In such circumstances, all information technology users should regularly improve their understanding and attitude towards the safe use of these information technologies. Besides the technical measures for securing the data, which is processed in the IT infrastructure, the training of all personnel in understanding the threats that can arise from working with IT devices, is a necessity.

Large-scale technical measures contribute to the protection of our data, these measures are accurate, timely, comprehensive, and respond very well when are well managed. But the human factor is not excluded from the impact on these technical measures. Human virtues and flaws play a major role in the implementation of effective cybersecurity. It is the flaws that can contribute to the occurrence of vulnerabilities even in a perfectly designed technical system, intended to protect the information in cyberspace. The saying “The chain is as strong as its weakest link” best reflects the need for continuous improvement of cyber awareness.

When working with IT devices, people’s reaction is fast and reckless, almost as a conditioned reflex of the content they see. As a result, malicious emails are unknowingly opened, malicious links are clicked on web pages, and content that would otherwise remain private is shared. This behavior makes them vulnerable to cyber threats. The tendency to change people’s habits cannot be done overnight. This process must take planning and implementation of different measures and activities. The result should be increased awareness of the threats in cyberspace. Depending on the needs and conditions for implementation, the measures and activities that can result in increased cyber awareness can be taken in the short and long term.

The transition to an information society, with full digitalization, means preparing the institutions, businesses, and citizens for life and work within that society. The educational process is one of the pillars of that transformation. Good educational programs can help in preparation for the successful functioning of the digitally connected world. Besides others, these programs should include training on protection from threats in cyberspace. The educational process in the early school-age of children, through practical examples, can point to the threats that lurk on the Internet, such as misrepresentation, data theft, installation of malicious programs, misinformation, etc. Older children must be trained in recognizing and dealing with cyberbullying, financial fraud, cyber predators, sextortion, publishing content that will cause them problems in the future, etc.

Certainly, successful cooperation at the institutional level in a country would seriously affect the development of cyber awareness. The cooperation must include specific activities between the state bodies (ministries, agencies), local level bodies, educational institutions, as well as the non-governmental and private sector, to ensure the best possible continuous training of the citizens. In that direction, and with the accomplishment of various workshops, exercises, seminars, and conferences, we can increase awareness of threats in cyberspace and improve cooperation at the institutional level to deal with those threats. This approach reduces the gap between the institutions, enables the establishment of networks of contacts, improves the exchange of information, and strengthens the mutual trust of the staff. In that way, a stronger (integrated) institutional infrastructure is formed that knows how to recognize a threat in cyberspace and take measures to eliminate it.

Considering that over 82% of people in the Republic of North Macedonia are users of some of the social networks, it is clear that they are most vulnerable to threats in cyberspace through these platforms. Social networks are advertised as friendly and fun networks that are providing an easy and simple way to communicate, exchange pictures/videos and news. Such openness and easy access contribute to unprepared joining to social networks from many people. In such a case, without prior knowledge of the platforms, private and confidential information is easily shared, which, if they end up in the wrong hands, can easily be misused. Additionally, these users also become vulnerable to disinformation campaigns, often for political purposes. Therefore, just as social networks allow easy connections to their platforms, they should also have a simple interface for training new users in the consequences of using the social network. They should enable fast and intuitive management of the information that is posted/shared on the network platform.

Media campaigns are a great way to stay focused on the problems that arise in cyberspace. Whether aimed at children, young people, or the adult generation, media campaigns can help maintain attention and continuity in dealing with cyber threats. In this way, directly, through campaigns that show measures to eliminate threats in cyberspace, and subtly, through constant reporting of perceived problems, awareness of the risks in cyberspace can be maintained.

There is no doubt that the development of the information society will renew the old ones, but will also bring new, more modern threats in cyberspace. Dealing with those threats is a complex problem that should involve different entities and of course their aspects. Awareness of the threats in cyberspace must become part of our daily lives, we must live with it, notice the threats, and take measures to manage them.

This article is supported by the Metamorphosis Foundation and Techsoup. The views expressed in this publication are those of the author and do not always reflect the views of the Metamorphosis Foundation, Techsoup and C3I.

Source: Cyber Security, Corporate Security and Crisis Management Initiative


meta tim sliki-02.jpg




Author has a master’s degree in information science – computer engineering, C3I member, working in cybersecurity, computer networks, telecommunication, and system administration.

Other blog texts

Digital transformation: learning to live with the change


Image by Gerd Altmann from Pixabay   The ongoing Covid-19 crisis had a huge impact in forcing governments and businesses worldwide to hasten towards the implementation of various digital solutions. According to the McKinsey Global Survey of executives published in October 2020, the pandemic accelerated the adoption of new technologies by three to four years. […]

Some young people in North Macedonia during the coronavirus crisis managed to build successful businesses


Photo: Archive of Meta.mk During the coronavirus crisis, some young people in North Macedonia saw the opportunity to start their own businesses or to adapt their existing businesses to the new normal that was imposed by the restrictive measures against the coronavirus. The stories that were told to Meta.mk by Teona Mango, Goran Bakrevski and […]

Rural Coalition: Farmers still "hang" on the counters, the application of digitalization in its initial stage


Age, habits, mentality, lack of sufficient knowledge, resistance to change and learning something new, fear of making a mistake – what is the key reason for the low level of digitalization in Macedonian agriculture? Why is it much easier for most of our farmers to go to the regional unit and “hang” on the counters, […]

Zero Roaming in the Balkans from July 1st – Majlinda Bregu: Success, in the future we’ll have zero tariffs even with the EU


Starting from July 1st, the cell phone tariffs are not changing even while crossing the national borders in the Western Balkans. This process was lead from the Regional Cooperation Council, and Majlinda Bregu, as Head of the institution has stated for SCAN TV that this is only the starting point and as a next step, […]

Open Data Misconceptions: Experience from the Western Balkans


Source: www.pixabay.com   Open data as a concept is relatively new, it hasn’t yet celebrated its 30th birthday since it was first mentioned as a term in 1995 from an American scientific agency. Nevertheless, it has gained prominence across the world at a great speed due to the need for fast and easy access to […]

A closer look at AI-powered governments


Unsplash / Markus Winkler Who would imagine that people – even the elderly or those with no knowledge about computers – would vote over this quirky new thing called the Internet 30 years ago? It’s already more than a decade-long practice in Estonia. Thirty years around the corner, today’s government practices would probably seem and […]