CURRENTLY ON AIR ⇒
  • Highlights of the Days Programmes
    Saturday, 10:05 pm - 3:30 am
    [ - ]

feedback@radioislam.org.za

logo


((( Listen Live )))))
Radio Islam Logo


Why Do Users Get Attacked – Part 2

Technology is growing every day, and as it grows, it transforms our digital world. Internet use is increasing exponentially, making us correspondingly more vulnerable to cyber-attacks. By learning how cybercriminals attack and how to secure our systems and data against those attacks, we will be able to minimize the risk of data breaches and the devastation they bring with them.

Before getting into how to secure data from breaches, we must try to understand the motives behind these attacks. By knowing the motives behind the attacks, it’s easy for cybersecurity professionals to secure the systems. The main motives for attacking an organization’s or individual’s computer are:

Disrupting a business’ continuity:
If a business is disrupted, it causes great harm to the organization in the form of lost profits, fraud, and damage to its reputation. And one way that has become common is through cybercrime.

Information theft and manipulating data:
Hackers take confidential information that they steal from organizations and sell it to individuals or groups on the black market. This sensitive and private information is very often at the core of the business` operations.

Creating chaos and fear by disrupting critical infrastructure:
Cyber terrorists attack a company or a government body to disrupt their services, doing damage that can potentially affect an entire nation.

Financial loss to the target:
Hackers attack an organization or business and disrupt their services in such a way that the target has to allocate substantial funds to repair the damage.

Achieving a state’s military objectives:
Rival nations continuously keep an eye on each other and sometimes employ cybercriminal tactics to steal military secrets.

Demanding ransom:
The hackers employ ransomware to block a website or servers, releasing control only after a ransom is paid.

Damaging the reputation of target:
The hacker may have personal reasons to attack an organization or individual so that their reputation suffers.

Propagating political beliefs:
Hackers may infiltrate websites to promote a certain political agenda, usually to sway voters to vote a certain way.

ADVERTISE HERE

Prime Spot!!!

Contact:
advertisingadmin@radioislam.co.za 

Related Articles

A Practice of Acknowledgement – Part 5

A Practice of Acknowledgement – Part 5

Deconstructing Gratitude Quick Recap - The Limits of Gratitude Gratitude is valuable, but it becomes harmful when it is forced, misused, or used to silence real feelings. Toxic gratitude appears when people are told to “just be grateful” in situations where they are...

read more
Limits of Gratitude – Part 4

Limits of Gratitude – Part 4

Deconstructing Gratitude Quick Recap - Gratitude as a Social Cohesive Gratitude is not just a personal feeling — it is a social force that strengthens relationships, teams, and communities. Expressing thanks builds trust, deepens empathy, reduces conflict, and...

read more
Gratitude as a Social Cohesive – Part 3

Gratitude as a Social Cohesive – Part 3

Deconstructing Gratitude Quick Recap - The Gratitude Deficit A gratitude deficit happens when envy, comparison, and resentment quietly take over our attention, making us focus more on what we lack than what we have. This isn’t intentional — it’s a natural response to...

read more
Gratitude Deficit – Part 2

Gratitude Deficit – Part 2

Deconstructing Gratitude Quick Recap - Gratitude for Adversity Gratitude isn’t only about appreciating good moments — it also includes finding meaning in difficult experiences. Gratitude for adversity means honestly acknowledging hardships and then recognising the...

read more
Gratitude for Adversity – Part 1

Gratitude for Adversity – Part 1

Deconstructing Gratitude Gratitude for Adversity How to find meaning and thankfulness in our hardest times When most people hear the word gratitude, they imagine writing down a few nice things that happened during the day — sunshine, good food, or a kind message from...

read more
The Spectrum of Advocacy – Part 4

The Spectrum of Advocacy – Part 4

The Conscientious Citizen Quick Recap - Information Hygiene in an Era of Misinformation In today’s fast-paced digital world, misinformation spreads quickly — often faster than the truth. Because of this, being a responsible consumer and sharer of information has...

read more

Subscribe to our Newsletter

0 Comments