{"id":3066,"date":"2019-10-25T15:41:52","date_gmt":"2019-10-25T13:41:52","guid":{"rendered":"http:\/\/weekly.uhm.org.mt\/?post_type=article&#038;p=3066"},"modified":"2019-10-25T15:41:52","modified_gmt":"2019-10-25T13:41:52","slug":"is-sigurta-fuq-l-internet-hija-r-responsabbilta-ta-kulhadd","status":"publish","type":"article","link":"http:\/\/weekly.uhm.org.mt\/en\/article\/is-sigurta-fuq-l-internet-hija-r-responsabbilta-ta-kulhadd\/","title":{"rendered":"Internet security is everyone\u2019s responsibility"},"content":{"rendered":"<p><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-3067\" src=\"http:\/\/weekly.uhm.org.mt\/wp-content\/uploads\/2019\/10\/iStock-1065824694.jpg\" alt=\"\" width=\"2121\" height=\"1414\" srcset=\"http:\/\/weekly.uhm.org.mt\/wp-content\/uploads\/2019\/10\/iStock-1065824694.jpg 2121w, http:\/\/weekly.uhm.org.mt\/wp-content\/uploads\/2019\/10\/iStock-1065824694-300x200.jpg 300w, http:\/\/weekly.uhm.org.mt\/wp-content\/uploads\/2019\/10\/iStock-1065824694-768x512.jpg 768w, http:\/\/weekly.uhm.org.mt\/wp-content\/uploads\/2019\/10\/iStock-1065824694-1024x683.jpg 1024w, http:\/\/weekly.uhm.org.mt\/wp-content\/uploads\/2019\/10\/iStock-1065824694-480x320.jpg 480w\" sizes=\"(max-width: 2121px) 100vw, 2121px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"auto\">Internet security is a<\/span><span data-contrast=\"auto\">\u00a0key consideration for individuals and families as well as workplaces, governments and education institutions.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">For families and parents, internet security<\/span><span data-contrast=\"auto\">\u00a0for children and members of the family is of major importance. In terms of our financial security, it is crucial that we protect information that can impact our personal finances. By installing security software on our computers, we are protecting precious personal information, including photos, as well as videos and music that we would have downloaded from the internet.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:142,&quot;335559739&quot;:160,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">School administrations, staff and students know that the internet<\/span><span data-contrast=\"auto\">\u00a0provides great learning opportunities as well as risks. Students, teachers and administrators should know that they should protect themselves and should also understand the connection between the world of the internet and the real world. Learning how to protect computers and how to behave on the internet helps lessen our vulnerability and create a more secure environment on the internet.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:142,&quot;335559739&quot;:160,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">SMEs<\/span><span data-contrast=\"auto\">\u00a0face critical challenges because of their limited resources and lack of knowledge. The rate at which technology is evolving is making it difficult to keep abreast of security issues. However, awareness of such issues and good planning help workplaces protect their\u00a0<\/span><span data-contrast=\"auto\">intellectual\u00a0 property<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:142,&quot;335559739&quot;:160,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Central governments, Local\u00a0<\/span><span data-contrast=\"auto\">C<\/span><span data-contrast=\"auto\">ouncils and other entities such as trade unions,\u00a0<\/span><span data-contrast=\"auto\">maintain a huge amount of personal data and records on citizens or their members. Apart from this they also hold confidential information that could be targeted by hackers.\u00a0<\/span><span data-contrast=\"auto\">Public entities can be threatened by an infrastructure that is not sufficiently secure and lack of knowledge. Better\u00a0<\/span><span data-contrast=\"auto\">security<\/span><span data-contrast=\"auto\">\u00a0helps public entities provide more reliable services, keep in touch with the citizen and protect sensitive information.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:142,&quot;335559739&quot;:160,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">What should<\/span><span data-contrast=\"auto\">\u00a0the role of<\/span><span data-contrast=\"auto\">\u00a0each\u00a0<\/span><span data-contrast=\"auto\">and every\u00a0<\/span><span data-contrast=\"auto\">one\u00a0<\/span><span data-contrast=\"auto\">of us be with regard to internet security? I think that it is important that we recognise the various types of threat that exist in the virtual world. When we are online, we need to keep the following in mind: stop, think,\u00a0<\/span><span data-contrast=\"auto\">connect<\/span><span data-contrast=\"auto\">. Stop a\u00a0<\/span><span data-contrast=\"auto\">moment. Think about how we are going to safeguard information and personal data before we act. Connect responsibly.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:142,&quot;335559739&quot;:160,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">We\u00a0<\/span><span data-contrast=\"auto\">sometimes<\/span><span data-contrast=\"auto\">\u00a0receive malicious\u00a0<\/span><span data-contrast=\"auto\">or fake\u00a0<\/span><span data-contrast=\"auto\">emails<\/span><span data-contrast=\"auto\">\u00a0that could damage our systems if we are not careful. One must be vigilant and not open messages or attachments from unknown sources. Even the passwords we create should be strong and hard to guess.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:142,&quot;335559739&quot;:160,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Apart from this, although social media offers many diversions and can help you stay connected, it can also create opportunities for theft of information or jeopardise someone\u2019s identity or personal security. This is why we need to protect our identity on social media sites. Over all, we need to be assertive and not share information that can help others steal our\u00a0<\/span><span data-contrast=\"auto\">personal<\/span><span data-contrast=\"auto\">\u00a0identity.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:142,&quot;335559739&quot;:160,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Internet security is a\u00a0key consideration for individuals and families as well as workplaces, governments and education institutions.\u00a0 For families and parents, internet security\u00a0for children and members of the family [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":3067,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","format":"standard","meta":{"_mi_skip_tracking":false,"spay_email":""},"issuem_issue":[137],"issuem_issue_categories":[],"issuem_issue_tags":[],"translation":{"provider":"WPGlobus","version":"2.8.8","language":"en","enabled_languages":["mt","en"],"languages":{"mt":{"title":true,"content":true,"excerpt":false},"en":{"title":true,"content":true,"excerpt":false}}},"_links":{"self":[{"href":"http:\/\/weekly.uhm.org.mt\/en\/wp-json\/wp\/v2\/article\/3066"}],"collection":[{"href":"http:\/\/weekly.uhm.org.mt\/en\/wp-json\/wp\/v2\/article"}],"about":[{"href":"http:\/\/weekly.uhm.org.mt\/en\/wp-json\/wp\/v2\/types\/article"}],"author":[{"embeddable":true,"href":"http:\/\/weekly.uhm.org.mt\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/weekly.uhm.org.mt\/en\/wp-json\/wp\/v2\/comments?post=3066"}],"version-history":[{"count":2,"href":"http:\/\/weekly.uhm.org.mt\/en\/wp-json\/wp\/v2\/article\/3066\/revisions"}],"predecessor-version":[{"id":3069,"href":"http:\/\/weekly.uhm.org.mt\/en\/wp-json\/wp\/v2\/article\/3066\/revisions\/3069"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/weekly.uhm.org.mt\/en\/wp-json\/wp\/v2\/media\/3067"}],"wp:attachment":[{"href":"http:\/\/weekly.uhm.org.mt\/en\/wp-json\/wp\/v2\/media?parent=3066"}],"wp:term":[{"taxonomy":"issuem_issue","embeddable":true,"href":"http:\/\/weekly.uhm.org.mt\/en\/wp-json\/wp\/v2\/issuem_issue?post=3066"},{"taxonomy":"issuem_issue_categories","embeddable":true,"href":"http:\/\/weekly.uhm.org.mt\/en\/wp-json\/wp\/v2\/issuem_issue_categories?post=3066"},{"taxonomy":"issuem_issue_tags","embeddable":true,"href":"http:\/\/weekly.uhm.org.mt\/en\/wp-json\/wp\/v2\/issuem_issue_tags?post=3066"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}