Cybersecurity Essentials: Key Insights From George Agak

As our lives become increasingly intertwined with the internet, the ability to protect ourselves from cyber threats is a must-have skill.

Recently, we had the privilege of hosting George Agak, who shared his expertise on digital literacy in the context of cybersecurity. From his presentation, we got key insights into the complexities of online safety, from protecting personal information to recognizing and responding to cyber threats.

His presentation focused more on understanding online safety, anonymity, cyberthreats, all the way to responsible online behavior.

I’m Douglas, and this is my attempt to highlight the key lessons from the presentation. 

So, what is Cybersecurity?

Our speaker defined cybersecurity as the protection of internet-connected systems, including hardware, software, and data, from cyberattacks.

These tips will keep you safe online.

Types of Cyber Threats

He dug deeper to define some common cyber threats that we as internet users should be critically aware of :

  • Phishing

Phishing is a cyberattack where attackers disguise themselves as legitimate entities to trick individuals into revealing sensitive information like passwords and credit card details via fake emails or websites.

  • Malware

Malware is malicious software, including viruses, worms, and Trojans, designed to damage, disrupt, or gain unauthorized access to computer systems.

  • Ransomware

Ransomware is malware that encrypts a victim’s files, demanding payment for decryption, often causing significant data loss if the ransom is not paid.

  • Social Engineering 

Social Engineering exploits human psychology to manipulate individuals into revealing 

confidential information or performing actions that compromise security.

Having the presence of cyberthreats, there must be possible ways to counter their impact on our daily interaction with the internet. Here are some of the effective cybersecurity measures he advised: 

  1. Install antivirus
  2. Strong passwords
  3. Two-factor authentication
  4. Regular software updates
  5. User education on safe online practices.

Though cyber threats pose a risk to our data, digital privacy is one of the channels to overcome it.

Mr. Agak making a point during the session.

Digital Privacy

Nord defines Digital privacy as an individual’s ability to control and protect the access and use of their personal information online. Digital privacy helps individuals stay anonymous online by safeguarding personally identifiable information such as names, addresses, and credit card details. 

“It helps prevent identity theft, protect personal reputation, and maintain confidentiality,” he said. 

Why do you have to protect your personal data?

You need to protect your personal data to prevent misuse by third parties for fraud, such as phishing scams and identity theft. 

Here are some of the importance of safeguarding personal information as laid out by our speaker: 

  1. It prevents unauthorized access
  2. Minimizes the risk of identity theft
  3. Prevents fraudulent transactions
  4. Safeguarding Financial and Legal Security
  5. Trust in Digital services e.g. e-commerce.
  6. Compliance with Regulations and Ethical Standards e.g. GDPR, CCPA.


Online Anonymity.

Anonymity and identity shielding allow a user to hide or disguise their identifying information online. While this protects their privacy, it can make it difficult to hold them responsible for what they say and do online.

Why you may want to be anonymous online:

  1. Free speech & Whistleblowing
  2. Personal safety
  3. Data security
  4. To access geographically-restricted sites
  5. Sensitive topics

Having understood what online anonymity is and why you may want to be anonymous, it’s also important to familiarize ourselves with different ways of hiding identity online.

How to hide your identity online.

  1. Use VPNs or RDPs
  2. Browse incognito
  3. Clear cache/history
  4. Disable Geotagging
  1. Using TOR Browser
  2. stop signing to apps with your social accounts

NOTE: Mr. Agak later emphasized that incognito mode is only suitable when you don’t want to leave your history in the browser, but not  hiding your identity.

Use VPN to hide your location and personal information when browsing.

Despite online anonymity having greater benefits to online users, it also has serious drawbacks that we need to be fully aware of. These are some of the limitations of online anonymity:

  1. Fuels cyberbullying
  2. Loss of credibility
  3. Anonymity makes us meaner

Responsible Online Behaviour.

This refers to ethical and respectful conduct when interacting with others on the internet. It encompasses various principles and practices aimed at fostering positive digital citizenship and creating a safer online environment.


Types of Online Harassment

Online harassment makes being online unattractive. The internet is for us all, and we need to be mindful of other users if we’re to create a safe ecosystem on the web.

Here are some of the most common types of online harassment; 

  • Revenge pornography
  • Catfishing
  • Virtual mobbing
  • Doxing
  • Trolling
  • Stalking
  • Sexual deepfakes

Safe Browsing Practices.

As an online user, you need to ensure that the sites you visit are safe for you and, most of all, your data. Our speaker addressed the following as the major ways of browsing safely.

  1. Use secure websites
  2. Disable third-party cookies
  3. Clear cache
  4. use ad blockers in your browser
  5. Avoid malicious downloads

Social Media Safety.

This is the process through which we ensure that we are safe while on social media. And here are some possible ways through which we ensure our safety online.

  1. Use privacy settings to limit who sees your posts and personal information
  2. Know real vs. fake/pseudo accounts
  3. Update your passwords regularly
  4. Use 2-factor authentication
  5. Verify info source before sharing
An attentive class during the session.

Mobile Device Security.

Mobile phones hold vital information about us. In order to enhance the safety of our information and data, these are some of the remedies that need to be put in place:

  1. Update your apps and OS to patch
  2. security vulnerabilities
  3. Enable user authentication, e.g. screen lock
  4. Avoid public Wi-Fi
  5. Cloud storage & Backup

Conclusion.

Information being the most valuable thing in the 21st century, you need to ensure its safety.  And one of the ways to accomplish that is by remaining informed and updated with the trends in cybersecurity.

Leave a Reply

Your email address will not be published. Required fields are marked *