Riaright arrowBlogright arrow

Cyber Security Awareness Month

x platformfacebooklinkedin
Tech

Cyber Security Awareness Month

October 4, 20184 min read
Illustration of a person holding a large key towards an oversized lock on a screen. Surrounding the screen are icons of an eye and a shield, symbolizing privacy and security. The background includes binary numbers representing digital data, highlighting the importance of cyber security awareness month.

While we’ve been busy worrying about whether robots will take over the world, cybersecurity breaches are expected to cost trillions in damages by 2021.

The National Cyber Security Awareness Month (NCSAM) was instituted in 2004 by the U.S. Department of Homeland Security and the National Cyber Security Alliance to “ensure that every individual stays safe and secure online.”

Today, the European Union Agency for Network and Information Security (ENISA) oversees a similar event in Europe, with Norway organizing its own through NorSIS (Norsk senter for informasjonssikring, “The Norwegian Center for Information Security” in English).

But what is cyber security?

Cisco defines cybersecurity as the practice of protecting systems, networks, and programs from digital attacks. Meanwhile, the Digital Guardian defines it as a body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage or unauthorized access.

We’ll just call it self-defense for the digital world.

And what are the main objectives of cyber security?

Dedicating a whole month to cybersecurity might sound excessive. But then again, there are more than 4,000 successful cyber-attacks registered every day, with online scams happening at work and at home. If we weigh in the potential risks and damages, the need for constant cybersecurity awareness becomes painfully evident.

The main goal of cyber security, or information technology security, is to protect computers, systems and networks from attacks and attempts at stealing data or information. Cyber security initiatives also aim to safeguard systems or networks from damage or interruptions in their services, which could be inflicted by attackers with various (and malicious) objectives.

And since our everyday lives are more and more reliant on technology, online platforms, mobile devices and digital services, cybersecurity will keep growing ever more critical. For instance, new mobile technologies like 5G, which promise to increase connectivity between devices, call for an even more robust cybersecurity strategy.

When is National Cyber Security Awareness Month?

Cybersecurity Awareness Month is celebrated every October, on to its 17th edition this 2020. Since its establishment many years ago, NCSAM has been providing toolkits and training to teach the public how to defend themselves against cyber-attacks.

Many themes have been addressed at previous editions of NCSAM. In 2018, for instance, Cybersecurity Awareness Month emphasized cybersecurity as a shared responsibility, for which Homeland Security highlighted four key points, as seen below:

  • Strengthen cybersecurity ecosystems;
  • Tackle cross-cutting, cross-sector crisis as a team;
  • Increase and strengthen cybersecurity workforce across all sectors;
  • Secure critical infrastructure.
The key points of NCSAM 2018.

The current edition of NCSAM’s focus is “If You Connect It, Protect It.” The topics to be promoted along the four weeks of October are related to establishing cybersecure environments for both personal and work devices. Safeguarding healthcare devices connected to the internet is another hot topic, as is the future of connected devices (as we discussed above regarding 5G).

Types of cyber-attacks 

Digital attacks come in all shapes and sizes, targeting anything from computers to networks and having a wide variety of goals behind them. Here is a list of the most common forms of cyberattacks:

  • Ransomware: sometimes, a malicious software called ransomware can kidnap your files and hold them hostage in exchange for money. However, nothing guarantees they will restore the data after payment. Other times, the software might have a more general target in mind. Malware, on the other hand, will try to gain access to your accounts or damage your computer.
  • Phishing: the most common type of cyberattack. Have you ever received an email from a seemingly reputable source, only to find there’s something… fishy about the address? Phishing emails are an attempt to steal sensitive information, be it your credit card or login. Then again, there’s a specific, and more dangerous, type of phishing attack called “spear phishing.” In this type of attack, the email and its contents appear to be completely legitimate, being crafted specially for the recipient.
  • Social engineering: This threat utilizes ransomware or malware, but takes it a step further by tricking its victim into revealing sensitive information, which is then be used for nefarious purposes.

But don’t worry! The good news is that we can avoid many of these attacks by simply being aware of them. That’s NCSAM’s mission, to raise awareness about cyberattacks so you can learn to recognize and avoid them.

The overarching message is that, when it comes to cybercrime, we stand united and fall divided. To emerge victorious, we must prevent breaches at all levels. In the 21st century, we all have to work with the goal of cybersecurity in mind. 

The information on or through this site is provided for general informational purposes only and should not be relied on as a substitute for specific advice about laws, regulations, taxes, finances, immigration or travel. For specific advice, contact a licensed attorney, financial advisor or other professional. We disclaim all liability and responsibility arising from any reliance placed on this site. We do not warrant the accuracy or usefulness of this information. This site may contain links to other sites and information provided by third parties for your convenience. We do not endorse nor make any guarantees with respect to these sites, their accessibility, the information they contain or the way they treat any information you provide to them.

About the author

Blog post author profile image

Gabrielle van Welie

Gabrielle van Welie is Ria's Global Content Manager. Originally from Dominican Republic, she specializes in the cultural impact of remittances and migration across the globe.

Related posts

How to Monetize Your Platform with Embedded Money Transfer Services

How to Monetize Your Platform with Embedded Money Transfer Services

Key Takeaways ▪ Embedded finance allows platforms to offer financial services natively, boosting revenue and user retention. ▪ Integrated Money Transfers enable SaaS, fintechs, and marketplaces to integrate remittance features seamlessly. ▪ Ria Money Transfer offers a scalable, secure, and global API solution for platforms targeting international or migrant users. ▪ Monetizing with remittance-as-a-feature is an evergreen strategy for platforms […]

September 18, 2025

How Ria Money Transfer Keeps Your Data Safe

How Ria Money Transfer Keeps Your Data Safe

In today’s rapidly evolving and ever digitalized world, keeping data protection in top of mind is both necessary and essential for all companies, and at Ria it’s no different. Although data protection laws and principles are commonplace nowadays, we still take it very seriously because of the industry we are in. That’s why data protection […]

September 3, 2025

What is Embedded Finance? A Simple Guide to Embedded Solutions

What is Embedded Finance? A Simple Guide to Embedded Solutions

In today’s fast-paced, digital-first world, we interact with technology in ways we barely notice. From getting a loan online to transferring money overseas with a few taps, there are hidden mechanisms constantly at work to make these seamless experiences possible. One of the powerful forces driving this ease and convenience is something called embedded solutions. […]

July 2, 2025

Data Privacy: What You Should Know and How to Protect Yourself

Data Privacy: What You Should Know and How to Protect Yourself

As digital interactions grow, so do concerns about data privacy and how our information is collected, used, and shared. As consumers, we share a significant amount of personal data with companies that provide us with services every day. This includes details like our location, our spending habits and even our heart rate. With so much […]

March 24, 2025