top of page
Nikhila Puli

Cybersecurity- Part 2 : A glance in the digital world of data flow.

Everyone feels we need to be secure in the outside world. But I say, we should be even more careful about the social world or the so-called internet world.

Okay! You should be careful. But how?

All of a sudden, we can’t be the cybersecurity specialist for ourselves or hire a specialist.

Of course! You can hire if you are running a business or you’re the person with the most concerns about your professional life apart from your personal life.

So, what about normal people?

Normal people like students, general working employees etc.

don’t worry buddy! I’m here to give you some tips and also acknowledge cybersecurity.

If you want to know the basics of cybersecurity. Then do check out my previous blog “Acknowledge cybersecurity”. So that you will have an overview of how much is these security changes matter.

In this blog, I’ll present you with some of the websites to know more about cyberattacks happening out there.

1. How many people are using the internet?

2. Check whether your email is compromised or not?

3. How many and what are the cyberattacks going on – Live?

On this basis, I’ll provide you with the three websites.

1. How many people are using the internet?


As we know well, everyone is living with the internet. It’s like we are beginning our day with social media(internet) and even ends with it. We almost complete every task on the internet including clothing, day to day groceries, education and even consulting a doctor online.

In a family of four, more or less there will be at least three smartphones. At this rate, can you imagine the number of internet users?



here is the website which provides data about internet users.

5 billion-plus internet users and still increasing. Not only the internet but also the new websites have been created, Facebook active users, Twitter active users, Google+ active users, Pinterest active users and so on.

This website has live statistics about the Emails sent, Google searches, blog posts written, tweets sent, videos viewed on YouTube, skype calls, electronics like laptops, smartphones and tablets sold, photos uploaded on Instagram daily.

Till here it's okay to know this information in common but there are some other things which you need to concentrate on this website.

That is about the number of websites hacked. Daily, this website presents the count of hacked websites.

Website is hacked, Not our devices or any of our social media accounts. So, you think! You are safe. Right?

Then you must know this.


Check whether your mail is compromised or not?

We browse and check different websites. Some of the websites ask us to provide basic details, some websites don’t show any content until we log in and accept website cookies.

Is this safe or not?

Providing details is safe until the website is hacked.

Every website will protect the client data but once it is hacked, the data will be theft depending on the level of attack and how long that attack is been active.

Some shopping websites like Flipkart, Amazon, Ajio, Myntra and all, will have our details including contact number, address etc. if such websites are being hacked then data theft may take place. so, do take some steps to protect your information.

Check whether your mail is compromised or not from the below website


Enter your email and check. It shows whether your email is compromised or not. If it’s compromised then it also shows through which website your email is been compromised. Go through the website and change login credentials.

Now, know about the cyberattacks happening around you and all over the world.

How many and what are the cyberattacks going on – Live?

This is the website that gives all the statistics about the cyber attacks happening.


Across the world, different cyberattacks are happening and are still active. This is the live status of the attacks.

You can check the status of every country.


This is the data related to INDIA.

Be aware of things happening online and conscious about the details you share on different platforms.


.

.

.

.


Future blogs by me will be on

  • Secured encryption mechanism for communication

  • How to identify if your Digital device is being controlled by someone else.

  • Is there a permanent solution to protect our identity on internet using blockchain








118 views0 comments

Recent Posts

See All

Comments


bottom of page