{"id":14710,"date":"2020-10-01T14:14:38","date_gmt":"2020-10-01T12:14:38","guid":{"rendered":"https:\/\/www.itaf.eu\/?p=14710"},"modified":"2023-05-26T12:18:55","modified_gmt":"2023-05-26T10:18:55","slug":"online-threats-and-security","status":"publish","type":"post","link":"https:\/\/www.itaf.eu\/en\/online-threats-and-security\/","title":{"rendered":"Online threats and security"},"content":{"rendered":"<p>Every year in October around the world, many organizations, companies, and individuals are organizing various events with the goal to raise awareness of online threats and security, by providing educational content through video, blog posts, books (in both physical and electronic format), or even through some interesting games. All of this presents the National Cybersecurity Awareness Month (NCSAM), a whole month dedicated to educating people about cyber security threats so they could keep themselves and their families safe both at home and at work, as well as in school, or some other public place.<\/p>\n<p>Cyber security threats (or online threats) can have a large impact on both business and personal life. It is not a secret that \u201cdata is the new oil\u201d. There are many criminal organizations and individuals who are trying (and succeeding) to breach companies, organizations or\/and home networks to steal any valuable information that could be useful to gain some advantage or money for example. It is well-known that humans are the weakest link in the cyber chain, and statistics show that most of cyber incidents are happening due a human mistakes.<\/p>\n<h2>Common threats<\/h2>\n<p>So, what online threats exist today? Well, there are many online threats, but if we should single out some of them, those would be:<\/p>\n<h3>1. Phishing<\/h3>\n<p>This type of threat is usually distributed through emails that contain malicious links and attachments which if you open them, can either infect your PC\/mobile with some malware or can lead you to some web pages where if you leave your personal information (like a credit card for example), they can be stolen. Those emails often tend to scare a victim to gain information. One example of such a threat is that you can receive an email that tells you your PC is infected with a virus and you need to immediately download and install some recommended antivirus software to clean your PC. If you do that, you will then actually infect your PC. These messages are also often called SPAM messages.<\/p>\n<h3>2. Ransomware<\/h3>\n<p>This is probably the most common threat nowadays. Trends of using this type of malware among criminal organizations are raising every day. Ransomware is a type of malware that once it gets into your network (PC, server, mobile, printer, etc.) it starts locking all your files, documents, pictures, music, even cloud files, by encrypting them.<br \/>\nAfterward, you will get a message on your infected device that to unlock (decrypt) your files, you need to pay a ransom. Nobody can guarantee that you will get a key to unlock your files if you pay, so there is a risk to be tricked twice. The important thing to remember is that a ransomware victim can be anyone, not just some big or tech company, also this type of malware can be deadly.<\/p>\n<p>Some ransomware cases can be found on the links bellows:<br \/>\n\u2013 <a class=\"jshlink\" href=\"https:\/\/www.zdnet.com\/article\/first-death-reported-following-a-ransomware-attack-on-a-german-hospital\/\" target=\"_blank\" rel=\"noopener noreferrer\">First death reported following a ransomware attack on a German hospital<\/a><br \/>\n\u2013 <a class=\"jshlink\" href=\"https:\/\/www.vrt.be\/vrtnws\/en\/2020\/01\/13\/ransomware-shuts-down-production-at-flemish-multinational\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ransomware shuts down production at Flemish multinational<\/a><\/p>\n<h3>3. Weak passwords<\/h3>\n<p>A trend of using a weak password has been around ever since the beginning of the Internet. Many people set up their personal information like their birthdays, pet names, or names of their relatives for Internet services, especially for critical ones, such as bank accounts, emails, etc. Many companies do not enforce strong password policies, which can result in breaching and accessing critical parts of the company network by criminals.<\/p>\n<h2>Security Awareness Training<\/h2>\n<p>While solutions for these types of threats can be based on some software or hardware, they can also be based on an educational program. Educating staff about these types of threats (and other common threats), teaching them how to recognize basic scams, and how to protect themselves and others around them, is the base point of every organization\u2019s security. This can be done through Security Awareness Training, which is a training that aims to teach and prepare people (especially non-tech) for everyday threats on the Internet. The content of such training should not be limited only to theoretical knowledge, but also should include practical one, where people could test their knowledge and be sure that they could recognize a threat in case they see it.<\/p>\n<h2>How can ITAF help you?<\/h2>\n<p>If you need help with educating your employees, friends, and colleagues, <a class=\"jshlink\" href=\"https:\/\/www.itaf.eu\/en\/contact-us\/\" target=\"_blank\" rel=\"noopener noreferrer\">contact ITAF<\/a> and we can provide you with quality security awareness training prepared by our security experts, that will help you to keep yourself and others around you, safe on the Internet.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every year in October around the world, many organizations, companies, and individuals are organizing various events with the goal to raise awareness of online threats and security, by providing educational content through video, blog posts, books (in both physical and electronic format), or even through some interesting games. All of this presents the National Cybersecurity [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":35073,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ngg_post_thumbnail":0,"footnotes":""},"categories":[96],"tags":[],"class_list":["post-14710","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Online threats and security - ITAF IT Partner<\/title>\n<meta name=\"description\" content=\"Cyber security threats (or online threats and security) can have a large impact on business. It is not a secret that \u201cdata is the new oil\u201d.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.itaf.eu\/en\/online-threats-and-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Online threats and security - ITAF IT Partner\" \/>\n<meta property=\"og:description\" content=\"Cyber security threats (or online threats and security) can have a large impact on business. It is not a secret that \u201cdata is the new oil\u201d.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.itaf.eu\/en\/online-threats-and-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ITAF IT Partner\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ITAF.eu\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-01T12:14:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-26T10:18:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.itaf.eu\/wp-content\/uploads\/2020\/10\/Cyber-Security-October-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dejan Janosevic\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ITAF_IT_partner\" \/>\n<meta name=\"twitter:site\" content=\"@ITAF_IT_partner\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dejan Janosevic\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/online-threats-and-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/online-threats-and-security\\\/\"},\"author\":{\"name\":\"Dejan Janosevic\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/person\\\/76d18fd2e3c2d369c9b20b96217208c2\"},\"headline\":\"Online threats and security\",\"datePublished\":\"2020-10-01T12:14:38+00:00\",\"dateModified\":\"2023-05-26T10:18:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/online-threats-and-security\\\/\"},\"wordCount\":748,\"publisher\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/online-threats-and-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Cyber-Security-October-1.jpg\",\"articleSection\":[\"IT Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/online-threats-and-security\\\/\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/online-threats-and-security\\\/\",\"name\":\"Online threats and security - ITAF IT Partner\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/online-threats-and-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/online-threats-and-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Cyber-Security-October-1.jpg\",\"datePublished\":\"2020-10-01T12:14:38+00:00\",\"dateModified\":\"2023-05-26T10:18:55+00:00\",\"description\":\"Cyber security threats (or online threats and security) can have a large impact on business. It is not a secret that \u201cdata is the new oil\u201d.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/online-threats-and-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.itaf.eu\\\/en\\\/online-threats-and-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/online-threats-and-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Cyber-Security-October-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Cyber-Security-October-1.jpg\",\"width\":1080,\"height\":600,\"caption\":\"Online threats and security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/online-threats-and-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Online threats and security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/\",\"name\":\"ITAF IT Partner\",\"description\":\"Reliable IT support\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#organization\",\"name\":\"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/ITAF-Geniki_logo_512px-1.webp\",\"contentUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/ITAF-Geniki_logo_512px-1.webp\",\"width\":512,\"height\":166,\"caption\":\"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ITAF.eu\",\"https:\\\/\\\/x.com\\\/ITAF_IT_partner\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/itaf-eu?trk=tyah&trkInfo=clickedVerticalcompanyidx2-2-7tarId1429703363595tasitaf\",\"https:\\\/\\\/www.youtube.com\\\/@ITAFICTPartner\\\/\",\"https:\\\/\\\/www.instagram.com\\\/itaf.eu\\\/\",\"https:\\\/\\\/www.threads.net\\\/@itaf.eu\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/person\\\/76d18fd2e3c2d369c9b20b96217208c2\",\"name\":\"Dejan Janosevic\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/author\\\/dejan-janosevic\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Online threats and security - ITAF IT Partner","description":"Cyber security threats (or online threats and security) can have a large impact on business. It is not a secret that \u201cdata is the new oil\u201d.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.itaf.eu\/en\/online-threats-and-security\/","og_locale":"en_US","og_type":"article","og_title":"Online threats and security - ITAF IT Partner","og_description":"Cyber security threats (or online threats and security) can have a large impact on business. It is not a secret that \u201cdata is the new oil\u201d.","og_url":"https:\/\/www.itaf.eu\/en\/online-threats-and-security\/","og_site_name":"ITAF IT Partner","article_publisher":"https:\/\/www.facebook.com\/ITAF.eu","article_published_time":"2020-10-01T12:14:38+00:00","article_modified_time":"2023-05-26T10:18:55+00:00","og_image":[{"width":1080,"height":600,"url":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2020\/10\/Cyber-Security-October-1.jpg","type":"image\/jpeg"}],"author":"Dejan Janosevic","twitter_card":"summary_large_image","twitter_creator":"@ITAF_IT_partner","twitter_site":"@ITAF_IT_partner","twitter_misc":{"Written by":"Dejan Janosevic","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.itaf.eu\/en\/online-threats-and-security\/#article","isPartOf":{"@id":"https:\/\/www.itaf.eu\/en\/online-threats-and-security\/"},"author":{"name":"Dejan Janosevic","@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/person\/76d18fd2e3c2d369c9b20b96217208c2"},"headline":"Online threats and security","datePublished":"2020-10-01T12:14:38+00:00","dateModified":"2023-05-26T10:18:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.itaf.eu\/en\/online-threats-and-security\/"},"wordCount":748,"publisher":{"@id":"https:\/\/www.itaf.eu\/en\/#organization"},"image":{"@id":"https:\/\/www.itaf.eu\/en\/online-threats-and-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2020\/10\/Cyber-Security-October-1.jpg","articleSection":["IT Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.itaf.eu\/en\/online-threats-and-security\/","url":"https:\/\/www.itaf.eu\/en\/online-threats-and-security\/","name":"Online threats and security - ITAF IT Partner","isPartOf":{"@id":"https:\/\/www.itaf.eu\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.itaf.eu\/en\/online-threats-and-security\/#primaryimage"},"image":{"@id":"https:\/\/www.itaf.eu\/en\/online-threats-and-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2020\/10\/Cyber-Security-October-1.jpg","datePublished":"2020-10-01T12:14:38+00:00","dateModified":"2023-05-26T10:18:55+00:00","description":"Cyber security threats (or online threats and security) can have a large impact on business. It is not a secret that \u201cdata is the new oil\u201d.","breadcrumb":{"@id":"https:\/\/www.itaf.eu\/en\/online-threats-and-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.itaf.eu\/en\/online-threats-and-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itaf.eu\/en\/online-threats-and-security\/#primaryimage","url":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2020\/10\/Cyber-Security-October-1.jpg","contentUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2020\/10\/Cyber-Security-October-1.jpg","width":1080,"height":600,"caption":"Online threats and security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.itaf.eu\/en\/online-threats-and-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.itaf.eu\/en\/"},{"@type":"ListItem","position":2,"name":"Online threats and security"}]},{"@type":"WebSite","@id":"https:\/\/www.itaf.eu\/en\/#website","url":"https:\/\/www.itaf.eu\/en\/","name":"ITAF IT Partner","description":"Reliable IT support","publisher":{"@id":"https:\/\/www.itaf.eu\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.itaf.eu\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.itaf.eu\/en\/#organization","name":"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling","url":"https:\/\/www.itaf.eu\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2026\/02\/ITAF-Geniki_logo_512px-1.webp","contentUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2026\/02\/ITAF-Geniki_logo_512px-1.webp","width":512,"height":166,"caption":"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling"},"image":{"@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ITAF.eu","https:\/\/x.com\/ITAF_IT_partner","https:\/\/www.linkedin.com\/company\/itaf-eu?trk=tyah&trkInfo=clickedVerticalcompanyidx2-2-7tarId1429703363595tasitaf","https:\/\/www.youtube.com\/@ITAFICTPartner\/","https:\/\/www.instagram.com\/itaf.eu\/","https:\/\/www.threads.net\/@itaf.eu"]},{"@type":"Person","@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/person\/76d18fd2e3c2d369c9b20b96217208c2","name":"Dejan Janosevic","url":"https:\/\/www.itaf.eu\/en\/author\/dejan-janosevic\/"}]}},"_links":{"self":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts\/14710","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/comments?post=14710"}],"version-history":[{"count":2,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts\/14710\/revisions"}],"predecessor-version":[{"id":41960,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts\/14710\/revisions\/41960"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/media\/35073"}],"wp:attachment":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/media?parent=14710"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/categories?post=14710"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/tags?post=14710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}