National Cyber Security Awareness Month: How Defensive Cyber Security Techniques Can Mitigate Threats and Prevent Cyberattack

National Cyber Security Awareness Month: How Defensive Cyber Security Techniques Can Mitigate Threats and Prevent Cyberattack

October 2003 saw the beginning of the National Cyber Security Awareness Month (NCSAM) and from then on it is globally celebrated each year in October to raise awareness about the importance of Cyber Security.


We live in a time where everything is connected to the Internet. In the last few months, due to the novel coronavirus pandemic, the world’s dependency on the internet and technology-enabled applications has increased like never before. From working and learning remotely to purchasing the smallest of the items over the internet, our internet usage and screen time have increased exponentially due to this increased dependency. And so has the number of cyberattacks! Thus, it has become imperative for organisations to take proactive steps to secure their networks and the information that is transmitted through them and create a safer cyberspace.






GoDaddy, the world’s largest web domain registrar, became the target for one of the biggest cyberattacks where a hacker illegally accessed login information of the hosting accounts of 28,000 consumers. The organisation recognised suspicious activity on a subset of their servers on April 23, 2020, six months after the incident, which occurred on October 19, 2019, and immediately began an investigation. The unauthorised access to customers’ login credentials was used to connect to the secure shell (SSH) on their hosting account. The company instantly resorted to Defensive Cyber Security and reset the usernames and passwords of the targeted users and removed the offending SSH file from their platform to mitigate the attack.


What Are Defensive Security Techniques?


Defensive Cyber Security is one of the two important pillars of cyber security, the other being Offensive Cyber Security. Defensive techniques use methods like firewall management, patch management, password management, and network traffic analysis to ensure that networks and systems are safe from cyber ..

Support the originator by clicking the read the rest link below.