Wednesday, May 29, 2024


Dhaka Tribune

What can you do to prevent cyberattacks?

Some possible steps that can help

Update : 16 Sep 2022, 12:10 AM

Bangladesh has long been subjected to cyberattacks; institutions in the public, private, and financial sectors are all at risk from this. According to a report from the Bangladesh government's e-Government Computer Incident Response Team (BGD e-GOV CIRT), cyberattacks in Bangladesh are at an all-time high. Financial institutions have recently been the target of many attacks in Bangladesh; the theft at Bangladesh Bank resulted in huge financial loss. 

Cybercriminals frequently target computer networks or devices when committing crimes. To stop hackers from accessing or destroying data, not to mention using that data to blackmail, strong cyber security institutions should be developed. 

Malware, ransomware, social engineering, phishing, spear phishing, distributed denial-of-service (DDoS), and man-in-the-middle (MitM) attacks are just a few examples of the various forms of cyberattacks. It is also concerning that cyber hackers use fresh strategies in their attacks every day. 

One such example is a distributed denial-of-service attack (DDoS) which is a malicious attempt to obstruct a server, service, or network's regular traffic by saturating the target or its surrounding infrastructure with an excessive amount of internet traffic. A DDoS assault is similar to an unanticipated traffic bottleneck in that it delays the completion of routine activity.

One of the most adaptable technologies in use today is the Internet of Things (IoT). The Internet of Things (IoT) ecosystem is made up of web-enabled smart devices that use embedded systems, such as processors, sensors, and communication gear, to gather, send, and act on the data they get from their surroundings. The use of more IoT devices will only increase in the coming years. When the OWASP Internet of Things Project was proposed, the idea was to provide manufacturers, developers, and consumers with a better understanding of the security risks posed by the IoT while also aiming to empower users to make better security decisions when developing, deploying, or evaluating IoT technologies in any context.

To stop cyberattacks, some required actions must be taken such as: 

  • Software should be upgraded regularly
  • Having strong and secure passwords, especially for your bank app, social media, email, and other online streaming services
  • All accounts should use multi-factor authentication 
  • Email addresses from IDs you don't recognize should be ignored 
  • Data on computers should be backed up right away 
  • Install a firewall, whether home or in your office network 
  • Install an endpoint protection service and a high-security antivirus application 
  • Safeguard employee information and store data securely online in real time.

Data is important more and more these days. Cyber hackers steal or destroy the data we trade via the internet, and it goes without saying the damage that does. 

For Bangladesh’s safety, we must put together a team of cyber security professionals for this. The government of Bangladesh should take the initiative to improve online safety and train cyber security professionals to build a qualified workforce.

Engr Md Mahmudul Haque Khan is Assistant IT Officer, Bangladesh Institute of Governance and Management (BIGM). Email:[email protected].

Top Brokers


Popular Links