Interviews

Evolution of Cyber Threats: The Changing perspective for Young Internet Users

CXOToday has engaged in an exclusive interview with Joyce Rodriguez, Partner, Risk Advisory, Deloitte India

Q1. How has the threat landscape changed in recent years for young internet users given the rapid speed of digital transformation?

The rapid digital transformation has been both a boon and a bane for the young internet users. The proliferation of smartphones, social media, and mobile apps have exposed our youth to newer cyber threats more than ever before. From phishing and identity theft to deep fakes and cyberbullying, the youth have a diversity of threats to tackle. Youth today has access to a plethora of digital platforms for both educational and entertainment purposes, including online shopping, online gaming, video and audio streaming, social media sites, and dating sites. Some of the instances of violation of privacy, morphing, blackmailing, harassment, and exploitation have deeper impacts on the emotional and mental well-being of our youth.

To safeguard these young internet users, it’s crucial for parents and educators to stay informed about these evolving threats, and that security and privacy awareness become accessible to all. Much like value education and self-defense training, cybersecurity education must now become an integral part of the curriculum to teach young users how to navigate the digital world safely.

Q2. How can institutions include digital literacy into their curricula and what function does it play in guaranteeing youth cybersecurity?

Educational institutions are taking active steps to make digital literacy a part of academics by offering computer courses and coding classes. However, there is still a vacuum when it comes to cybersecurity and privacy literacy. Hence, the very first step should be to introduce periodic cybersecurity awareness programs. These programs should cover important topics such as online privacy, safe social media usage, recognizing phishing attempts, and ethical digital behavior. Additionally, educators can facilitate corporate collaborations to provide students with advice on cybersecurity directly from professionals. Instilling this sense in the youth from an early age will go a long way in creating a generation of responsible internet users.

In today’s interconnected world, cybersecurity literacy is as vital as traditional literacy. It empowers young people to understand the risks and responsibilities that come with digital technologies. Moreover, it equips them with the skills to protect themselves, their friends and families online.

Q3. Young people are very active on social media sites. How can they distinguish between accurate and false information to stop phishing attempts or con artists?

On one hand, false information is deliberately spread to misinform, while a phishing attack is a form of social engineering designed to trick the victim into revealing personal information. Both are distinct yet interrelated cyber threats that can be prevented through cyber awareness and vigilance. The young generation can take steps to protect themselves.

Firstly, verify the source of information by checking the credibility of the account or website sharing it. Secondly, cross-reference information with reliable sources; fact-checking websites can help separate fact from fiction. Lastly, exercise caution when sharing personal information or engaging in financial transactions through social media. By adopting these basic practices, young users can reduce their vulnerability to online scams.

Q4. Many youngsters enjoy playing online video games. In light of the growing popularity of in-game purchases in particular, how can they assure security while carrying out such activities?

Over the past few years, online video games have become very popular amongst the youth, but the introduction of in-game purchases has introduced new security concerns. It may seem tempting to opt for purchases, but a young person should pay equal attention to certain best practices.

Firstly, avoid downloading games that are not available on the official app stores because it would be very difficult to verify if they are genuine gaming apps with proper security in place. Secondly, don’t save your payment details, such as debit card, CVV or UPI ID, that could get leaked in case of a data breach. Thirdly, be cautious about sharing personal information with fellow gamers. Lastly, monitor the amount spent on in-game purchases and set spending limits if available. This will ensure that the youth continues to enjoy video games without being vulnerable in the cyber space.

Q5. New Technologies: Are there any cybersecurity concerns that young people should be aware of given the popularity of new technologies like augmented reality (AR) and virtual reality (VR) among this generation?

The way cyber landscape is developing, it is clear that cyber threats are now evolving in line with the  evolution of new technologies. The growing popularity of new technologies like augmented reality (AR) and virtual reality (VR) facilitates lifelike interactions in the online space. A good example is the metaverse which many young people are excited to use. At the same time, these technologies often rely on sensors, cameras, and connected devices, which can be vulnerable to cyber threats.

This is why young users must anticipate any potential risks. They need to configure their privacy settings carefully when using AR or VR and cautiously share personal information within virtual environments because there is always a scope for misuse.

Leave a Response