In immediately. Encryption of data will not be

        In today’s society technology is
advancing at a fast rate where almost everyone is able to connect with others
from across the globe in just a click of a button. Most important, documents
are in a “cloud” where you are able to access it easily on any device instead
of the old fashion piece of “paper”. But, most people stop to realize how
unsecure their personal information is, the more advanced technology is
becoming the more unsecure your personal information. Now, there are multiple
people who can have illegal access information and it’s happening every min.
Technology has became a necessity to our daily lives making everything easier
and faster to connect with others but there are a lot of dangers that come with
it such as cyber-attacks.

        Cybercrimes are done by individuals who
are called “hackers”. Hackers are individuals who seek computer system attacks.
The hackers are able to see of any form of IT devices such as computers,
phones, tablets and many other things as well. Most hackers do most of their
work from the comfort of their home behind a computer screen at any time they
please. (Wikipedia)

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

     Hackers can happen when you least expect
it, cyber-attacks are malicious acts usually originating from anonymous sources
that either steal, alter or destroy a specific data file in the computer
system. (Definition of Cyber-attack)Everyone is effected by cyber-attacks all
over the world because technology is advancing in today’s society.

the Problem

      The main reasons why this problem won’t
go away is because the more advanced technology is becoming the easier we are
making it for cyber-attackers (hackers) to access our data files. Many reasons
why we are making things easier for cyber-attackers to break into our computer
systems are because we are not persistent when it comes to knowing what, when,
where, why, and how is our data being used, we are lacking in data protection
and use weak passwords. We are all irresponsible when it comes to the simple
procedures used to keep our data protected, we should always know where we are
sending our data files. Just in case if something was to go wrong with the data
file we could be able to know exactly where to find it and how to stop it

       Encryption of data will not be effective
alone, there needs to be persistency for data security. The act of sending out our
information is giving the receiver full control over it, when you send out any
data files to someone without protecting it you are basically giving them the permission
to alter anything on that document giving them part ownership of the document.
Some people may even revise the document in a way to harm or threaten you
because the document came from your IP address, misuse of technology The
hackers then use their knowledge to hack into computers and steal     Now, most credit card users would not expect
their personal information to be stolen from a common restaurant like Jimmy
John’s, a sandwich franchise.  The
sandwich franchise both corporate and franchised locations were affected by a
data breach in approximately 216 locations, the hacker was able to obtain 56
million credit and debit cards. No individual would expect their favorite
restaurant to be a cause of their personal information being stolen. Being
aware and constantly checking your bank statements on your card decreases your
chances of being affected by the cyber-attacks. Being persistent with who,
what, when and where can make cyber security more effective and cyber-attacks

      Protecting your personal information
decreases your chances of being a victim of a cyber-attack, and using passwords
is one of the many ways of keeping hackers out. When it comes down to creating
a password everyone likes to get creative and critical to ensure their account
and information is sealed from outsiders. Spoofing attack is a much faster
process using a program, system or website to falsify data which is treated as
a trusted system to give the hacker full granted access to enter into your
personal information and accounts. (Hackers,

      Solutions and Procedures

   It is almost impossible to avoid being a
victim of cybercrimes completely because everyone is a user of some form of
technology device and most of important information stored on some computer
system. Which makes hackers have multiple ways of accessing different information
from all over the world. There are ways to prevent and or decrease your chances
of becoming a victim, users must install and keep up-to-date antivirus
programs, firewalls and spyware checkers. Along with keeping them up to date,
users must make sure that they run the scans regularly.

**Persistent control adds
a bonus to relocating data on any device, thus preventing any misuse, also
giving you awareness the location of your data file if any cyber-attacks were
to occur. Being persistent about the whereabouts of what, when, and where your
information is being used helps authorities to stop the attack before any real
damage is done.

     There are many companies out there that
provide free software, but there are other you can purchase, along with that of
the many produced by the leading companies providers; in addition, those
companies provide free version of their paid or subscription antivirus
software. Encryption of information that you do not want anyone to have
unauthorized access to is a good way to avoid some cybercrimes; information
such as password and credit card information for example. Encryption software
runs your data through encryption algorithms to make it unintelligible to
anyone who tries to hack into your computer.

Another good precaution
is to be weary of who you divulge your personal information to. Try to avoid
unknown websites, in particular those that ask for your name, mailing address,
bank account number or social security number. When doing online shopping make
sure website is secure, look for urls that starts with “https”and/or have the
Trustee or VeriSign seal. If you do not see these anywhere on the site, you run
the risk of submitting credit card information and other personal information
to a site that maybe a fraud.



      In conclusion, cyber-crimes will always
be a continuous crime that will be hard to stop completely but there are many
ways to make sure you are not a victim of a cyber-attack and your personal
information is protected. The everyday users and big companies need to be
educated on the new programs and software to help prevent and protect the data
files storage. Being aware and persistent are the basic procedures.

business should employ practices where their employees follow proper safety
practices to ensure that integrity and confidentially of stored information is
kept at all times to combat cybercrimes. Safety practices like ensuring that
staying off game sites on company time where viruses can be downloaded,
forwarding chain emails, leaving workstation unattended or password sharing
over virtual mediums should be prohibited. With all these safety practices