Riaright arrowBlogright arrow

Cyber Security Awareness Month

x platformfacebooklinkedin
Tech

Cyber Security Awareness Month

October 4, 20184 min read
Illustration of a person holding a large key towards an oversized lock on a screen. Surrounding the screen are icons of an eye and a shield, symbolizing privacy and security. The background includes binary numbers representing digital data, highlighting the importance of cyber security awareness month.

While we’ve been busy worrying about whether robots will take over the world, cybersecurity breaches are expected to cost trillions in damages by 2021.

The National Cyber Security Awareness Month (NCSAM) was instituted in 2004 by the U.S. Department of Homeland Security and the National Cyber Security Alliance to “ensure that every individual stays safe and secure online.”

Today, the European Union Agency for Network and Information Security (ENISA) oversees a similar event in Europe, with Norway organizing its own through NorSIS (Norsk senter for informasjonssikring, “The Norwegian Center for Information Security” in English).

But what is cyber security?

Cisco defines cybersecurity as the practice of protecting systems, networks, and programs from digital attacks. Meanwhile, the Digital Guardian defines it as a body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage or unauthorized access.

We’ll just call it self-defense for the digital world.

And what are the main objectives of cyber security?

Dedicating a whole month to cybersecurity might sound excessive. But then again, there are more than 4,000 successful cyber-attacks registered every day, with online scams happening at work and at home. If we weigh in the potential risks and damages, the need for constant cybersecurity awareness becomes painfully evident.

The main goal of cyber security, or information technology security, is to protect computers, systems and networks from attacks and attempts at stealing data or information. Cyber security initiatives also aim to safeguard systems or networks from damage or interruptions in their services, which could be inflicted by attackers with various (and malicious) objectives.

And since our everyday lives are more and more reliant on technology, online platforms, mobile devices and digital services, cybersecurity will keep growing ever more critical. For instance, new mobile technologies like 5G, which promise to increase connectivity between devices, call for an even more robust cybersecurity strategy.

When is National Cyber Security Awareness Month?

Cybersecurity Awareness Month is celebrated every October, on to its 17th edition this 2020. Since its establishment many years ago, NCSAM has been providing toolkits and training to teach the public how to defend themselves against cyber-attacks.

Many themes have been addressed at previous editions of NCSAM. In 2018, for instance, Cybersecurity Awareness Month emphasized cybersecurity as a shared responsibility, for which Homeland Security highlighted four key points, as seen below:

  • Strengthen cybersecurity ecosystems;
  • Tackle cross-cutting, cross-sector crisis as a team;
  • Increase and strengthen cybersecurity workforce across all sectors;
  • Secure critical infrastructure.
The key points of NCSAM 2018.

The current edition of NCSAM’s focus is “If You Connect It, Protect It.” The topics to be promoted along the four weeks of October are related to establishing cybersecure environments for both personal and work devices. Safeguarding healthcare devices connected to the internet is another hot topic, as is the future of connected devices (as we discussed above regarding 5G).

Types of cyber-attacks 

Digital attacks come in all shapes and sizes, targeting anything from computers to networks and having a wide variety of goals behind them. Here is a list of the most common forms of cyberattacks:

  • Ransomware: sometimes, a malicious software called ransomware can kidnap your files and hold them hostage in exchange for money. However, nothing guarantees they will restore the data after payment. Other times, the software might have a more general target in mind. Malware, on the other hand, will try to gain access to your accounts or damage your computer.
  • Phishing: the most common type of cyberattack. Have you ever received an email from a seemingly reputable source, only to find there’s something… fishy about the address? Phishing emails are an attempt to steal sensitive information, be it your credit card or login. Then again, there’s a specific, and more dangerous, type of phishing attack called “spear phishing.” In this type of attack, the email and its contents appear to be completely legitimate, being crafted specially for the recipient.
  • Social engineering: This threat utilizes ransomware or malware, but takes it a step further by tricking its victim into revealing sensitive information, which is then be used for nefarious purposes.

But don’t worry! The good news is that we can avoid many of these attacks by simply being aware of them. That’s NCSAM’s mission, to raise awareness about cyberattacks so you can learn to recognize and avoid them.

The overarching message is that, when it comes to cybercrime, we stand united and fall divided. To emerge victorious, we must prevent breaches at all levels. In the 21st century, we all have to work with the goal of cybersecurity in mind. 

The information on or through this site is provided for general informational purposes only and should not be relied on as a substitute for specific advice about laws, regulations, taxes, finances, immigration or travel. For specific advice, contact a licensed attorney, financial advisor or other professional. We disclaim all liability and responsibility arising from any reliance placed on this site. We do not warrant the accuracy or usefulness of this information. This site may contain links to other sites and information provided by third parties for your convenience. We do not endorse nor make any guarantees with respect to these sites, their accessibility, the information they contain or the way they treat any information you provide to them.

About the author

Blog post author profile image

Gabrielle van Welie

Gabrielle van Welie is Ria's Global Content Manager. Originally from Dominican Republic, she specializes in the cultural impact of remittances and migration across the globe.

Related posts

Data Privacy: What You Should Know and How to Protect Yourself

Data Privacy: What You Should Know and How to Protect Yourself

As digital interactions grow, so do concerns about data privacy and how our information is collected, used, and shared. As consumers, we share a significant amount of personal data with companies that provide us with services every day. This includes details like our location, our spending habits and even our heart rate. With so much […]

March 24, 2025

Everyday Financial Literacy Tips that You Can Follow

Everyday Financial Literacy Tips that You Can Follow

Money touches every aspect of our lives— from the way we plan our daily expenses to the dreams we hope to achieve in the future. Yet, many people feel overwhelmed when it comes to managing their finances. The good news is that you can master and effectively use various financial skills and concepts by gaining […]

March 19, 2025

Romance scams: what are they and how to avoid them?

Romance scams: what are they and how to avoid them?

Let’s start with this friendly reminder: anyone can fall victim to an online scam. While technology has evolved incredibly fast and made our lives easier in countless ways, so have scams. Fraudsters are getting more and more creative in using web applications, exploring cybersecurity flaws, and seizing any open opportunity to scam more netizens. Using […]

February 7, 2025

Empowering Global Growth: Optimizing Conversion with CRO and Marketing Technology Stack

Empowering Global Growth: Optimizing Conversion with CRO and Marketing Technology Stack

Growth in the money transfer business is more than just a numbers game—it’s about building stronger connections and empowering communities. Much like Conversion Rate Optimization (CRO) enhances user experience and business results, in our industry we focus on refining every interaction to ensure that sending money worldwide is both easy and secure for customers. So, […]

October 16, 2024