Your palms are clammy, thoughts are racing through your head at 100mph and you frantically begin to call your bank accounts, read up on credit monitoring, and check all your other online accounts to see if the damage has already been done.
These are just a couple of the reactions people have when they have been hacked. The thought of a stranger who gains access to all of your personal information is a nightmare, and an experience everyone wants to avoid.
Don’t give hacker’s any chance to break through your online security defenses and affect your life. Learn about the basics of cybersecurity defenses, gain insight into the mind of cybercriminals and educate yourself about the world of cybersecurity with the Top 4 Cybersecurity Ted Talks.
Each Ted Talk speaker touches upon a different sector in cybersecurity and shows you how you can better protect yourself from prying eyes. So avoid all the stress and watch one of the following cybersecurity TED Talks to learn trusted online security tips and practices.
Cybersecurity specialist James Lyne takes people into the minds of cybercriminals and exposes what demographic they are, the tools that they use, and the type of online users they target and hack.
He explains the different methods hackers use to distribute malware and paints common hacking scenarios. He highlights the online vulnerabilities people are unaware of and the average mistakes people make which leaves them vulnerable online.
At the end of his talk, Lyne guides viewers back to the importance of the cybersecurity basics and the consequences people face when they don’t follow the basics.
Speaking of the basics, speaker Lorrie Faith Cranor’s TED Talk is centered on the most elementary defense method of cybersecurity: the password.
We all know we should have a password and should never share or show our password to untrusted sources. Yet almost all online users fail the password tests.
Cranor reveals the common mistakes that people make when creating a password for online accounts and points out the password rules people that aren’t beneficial, while showcasing the rules they should always follow. She illustrates the easy process that hackers use to learn passwords and gain access to people’s data.
Today there are hundreds of devices, like mobile phones and tablets, that are created to simplify and better our lifestyle. Yet all of these devices are built upon software, and are can be hacked.
Technology has come a long way and hackers enjoy the challenge of trying to infiltrate other tech devices that a majority of people use.
Ruben exposes viewers to the different devices and equipment that hackers can gain control of, emphasizing the point that companies today need to think outside of the box, and know that anything with software is vulnerable to an attack.
What’s the first thing you think of when you hear or read cyber crime? The picture of an Eastern European auctioning off a document on the dark web that contains millions of passwords is one of the scenes some people think of.
Hypponen expands our perceptions and talks about three types of online attacks that are after people’s privacy and data. He then points out to viewers that only two are considered attacks.
If you have strong opinions about the Apple vs FBI battle or China’s new cybersecurity law, you’ll want to take a look at this 10 minute TED Talk. Hypponen predicts the future and talks about the importance of being prepared for advanced hacking methods, and the unavoidable conflict between the government and our online privacy.