{"id":709221,"date":"2024-03-08T13:02:45","date_gmt":"2024-03-08T11:02:45","guid":{"rendered":"http:\/\/devrri.freshlemon.ro\/?p=709221"},"modified":"2024-03-07T19:06:27","modified_gmt":"2024-03-07T17:06:27","slug":"protecting-against-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/protecting-against-cyberattacks-id709221.html","title":{"rendered":"Protecting Against Cyberattacks"},"content":{"rendered":"<p align=\"LEFT\"><span style=\"font-family: Arial, sans-serif;\"><span lang=\"en-US\">Three years ago, an aerial photo of camels in the Saudi Arabian Desert at sunset was named one of the best photos of the year by National Geographic. In this image, the camels are small white lines, and the black spots, which are shaped like camels, are just their shadows. The metaphor of this image is that we live in an era in which illusions, shadows, occupy practically the entire field of rational visualization of mankind, while realities, camels, go unseen. Does this metaphor also apply to cybersecurity? This is one of the questions answered by Maria Manuela Catrina, deputy director of the National Cybersecurity Directorate (NCSD), on Radio Romania. Her answer: many things go unseen, but not so unseen in the area of cybersecurity, that is, if we don&#8217;t always talk about them, it doesn&#8217;t mean we don&#8217;t see them, it&#8217;s hard at this moment not to realize what is going on.<\/span><\/span><\/p>\n<p lang=\"en-US\" align=\"LEFT\"><span style=\"font-family: Arial, sans-serif;\">&#8220;Many times, there are automatic systems that immediately notice changes in behavior in a network and help us, so that afterwards the human user comes to see what is happening, how it is happening, etc. Know that if you look carefully at the desert, and look every day, you see things, even when the wind blows. Even if it doesn&#8217;t seem like the wind is blowing, you still feel that something is wrong and you dig until you find what&#8217;s going on. That&#8217;s the beautiful part of cybersecurity &#8211; finding those things, feeling the things that are coming. There is an extremely large amount of data, there are tens and tens and tens of signals per second that we analyze, obviously using machines, because we are not able to do this at the human level, and see the &#8216;camels&#8217;. \u201c<\/span><\/p>\n<p lang=\"en-US\" align=\"LEFT\"><span style=\"font-family: Arial, sans-serif;\">According to the latest data, Romania faces approximately 25,000 cyberattacks every day. These have intensified since 2022, and have grown in intensity and complexity from year to year. In February, for example, following ransomware attacks, information was stolen from the Parliament&#8217;s database, and the activity of a few dozen hospitals was temporarily affected. The expert in health and national security policies Ioana St\u0103ncel considers that the security of the systems of several public institutions in the country was tested by attackers. She explained that, as far as hospitals are concerned, she is concerned about the fact that personal data, and medical information in particular, were at risk. Ioana St\u0103ncel points out that the responsibility for preventing such incidents rests with all institutions involved:<\/span><\/p>\n<p lang=\"en-US\" align=\"LEFT\"><span style=\"font-family: Arial, sans-serif;\">&#8220;Those who collect data and process them through these computer systems, namely hospitals, those who ensure the security of networks, the communications, transmission part, should have thought about this. Those who operate the servers on which there are programs and, not least , the state, which regulates this transfer, and the management of data through cybersecurity tests, should have considered forcing the providers, at the moment they enter into a contract with the state, respectively when they are financed by the state, to have this part of communication remote digital and data processing secured.&#8221; <\/span><\/p>\n<p lang=\"en-US\" align=\"LEFT\"><span style=\"font-family: Arial, sans-serif;\">First of all, we are referring to personal data, medical data, data regarding the vulnerabilities of some people, perhaps public figures, who can be blackmailed, who can be affected by finding out some information about their personal life, about their state of health, says Ioana St\u0103ncel.<\/span><\/p>\n<p lang=\"en-US\" align=\"LEFT\"><span style=\"font-family: Arial, sans-serif;\">&#8220;It is very serious, because these cyberattacks show us that it is possible to break into the networks of hospitals. And then we can think of at least two other types of risks: changing medical prescriptions, changing medical data in such a way that a person can be in a position to receive a medication that was not intended for them, or in concentrations that are not appropriate for their pathological condition. All of this may affect their state of health or lead to death. On the other hand, it is possible to interfere with the data recorded in connection with services and the financial claims for these services, either deleting data or adding data, all of which affect the accuracy of the data and claims to the state.&#8221; <\/span><\/p>\n<p lang=\"en-US\" align=\"LEFT\"><span style=\"font-family: Arial, sans-serif;\">We asked how can we protect ourselves from cyberattacks ? Clearly, at some point, any system can be broken into, says Maria Manuela Catrina:<\/span><\/p>\n<p lang=\"en-US\" align=\"LEFT\"><span style=\"font-family: Arial, sans-serif;\">&#8220;There are many things that can happen. The first advice I can give you: install an antivirus program on your phone, on your computer, there are free antivirus programs if you think a paid antivirus is expensive. It certainly protects you from many things that we are not always aware of. Sometimes we are in a hurry, sometimes we are tired, we don&#8217;t see well, and we click on something. We do many things that &#8216;open the door&#8217;. First, we are tempted to say far too much about ourselves. Consider that most cybercriminals do social engineering, they create a portrait of you based on what you post on various sites. If you are asked for information, think twice about why you are being asked that information. Why would someone from the power company, for example, call you to ask for your ID data? They have your data, because they have a contract with you. Common sense always protects us from 90% of things, but we have to be careful, not to rush.&#8221; <\/span><\/p>\n<p lang=\"en-US\" align=\"LEFT\"><span style=\"font-family: Arial, sans-serif;\">Connecting to a public Wi-Fi network without using a VPN (Virtual Private Network), at a hotel for example, is also very dangerous, says Maria Manuela Catrina. At the same time, the software must be adapted, passwords changed, the home network secured, as well as devices connected to the Internet \u2013 phones, tablets, refrigerators, vacuum cleaners, doorbells, cameras, children&#8217;s toys, adds the deputy director of the NCSD.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Three years ago, an aerial photo of camels in the Saudi Arabian Desert at sunset was named one of the best photos of the year by National Geographic. In this image, the camels are small white lines, and the black spots, which are shaped like camels, are just their shadows. The metaphor of this image [&hellip;]<\/p>\n","protected":false},"author":108,"featured_media":597392,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[43939],"tags":[],"coauthors":[113249],"class_list":["post-709221","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-future-starts-today"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protecting Against Cyberattacks - Radio Romania International<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/protecting-against-cyberattacks-id709221.html\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Against Cyberattacks - Radio Romania International\" \/>\n<meta property=\"og:description\" content=\"Three years ago, an aerial photo of camels in the Saudi Arabian Desert at sunset was named one of the best photos of the year by National Geographic. In this image, the camels are small white lines, and the black spots, which are shaped like camels, are just their shadows. The metaphor of this image [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/protecting-against-cyberattacks-id709221.html\" \/>\n<meta property=\"og:site_name\" content=\"Radio Romania International\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-08T11:02:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rri.ro\/wp-content\/uploads\/2024\/02\/atac-cibernetic-securitate-hacker-size-1200-foto-pixabay-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Corina Cristea\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Corina Cristea\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\\\/the-future-starts-today\\\/protecting-against-cyberattacks-id709221.html#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\\\/the-future-starts-today\\\/protecting-against-cyberattacks-id709221.html\"},\"author\":{\"name\":\"Corina Cristea\",\"@id\":\"https:\\\/\\\/www.rri.ro\\\/#\\\/schema\\\/person\\\/f9ab1cb3569dee1b2c033a814bb7f0fc\"},\"headline\":\"Protecting Against Cyberattacks\",\"datePublished\":\"2024-03-08T11:02:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\\\/the-future-starts-today\\\/protecting-against-cyberattacks-id709221.html\"},\"wordCount\":956,\"image\":{\"@id\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\\\/the-future-starts-today\\\/protecting-against-cyberattacks-id709221.html#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rri.ro\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/atac-cibernetic-securitate-hacker-size-1200-foto-pixabay-1.png\",\"articleSection\":[\"The Future Starts Today\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\\\/the-future-starts-today\\\/protecting-against-cyberattacks-id709221.html\",\"url\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\\\/the-future-starts-today\\\/protecting-against-cyberattacks-id709221.html\",\"name\":\"Protecting Against Cyberattacks - Radio Romania International\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rri.ro\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\\\/the-future-starts-today\\\/protecting-against-cyberattacks-id709221.html#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\\\/the-future-starts-today\\\/protecting-against-cyberattacks-id709221.html#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rri.ro\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/atac-cibernetic-securitate-hacker-size-1200-foto-pixabay-1.png\",\"datePublished\":\"2024-03-08T11:02:45+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.rri.ro\\\/#\\\/schema\\\/person\\\/f9ab1cb3569dee1b2c033a814bb7f0fc\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\\\/the-future-starts-today\\\/protecting-against-cyberattacks-id709221.html#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\\\/the-future-starts-today\\\/protecting-against-cyberattacks-id709221.html\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\\\/the-future-starts-today\\\/protecting-against-cyberattacks-id709221.html#primaryimage\",\"url\":\"https:\\\/\\\/www.rri.ro\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/atac-cibernetic-securitate-hacker-size-1200-foto-pixabay-1.png\",\"contentUrl\":\"https:\\\/\\\/www.rri.ro\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/atac-cibernetic-securitate-hacker-size-1200-foto-pixabay-1.png\",\"width\":1200,\"height\":800,\"caption\":\"(foto: pixabay.com)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\\\/the-future-starts-today\\\/protecting-against-cyberattacks-id709221.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Homepage\",\"item\":\"https:\\\/\\\/www.rri.ro\\\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Features and Reports\",\"item\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Future Starts Today\",\"item\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\\\/the-future-starts-today\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Protecting Against Cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rri.ro\\\/#website\",\"url\":\"https:\\\/\\\/www.rri.ro\\\/\",\"name\":\"Radio Romania International\",\"description\":\"Totul despre Rom\u00e2nia \u015fi rom\u00e2ni, \u00een 13 limbi\\\/dialecte!\",\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rri.ro\\\/#\\\/schema\\\/person\\\/f9ab1cb3569dee1b2c033a814bb7f0fc\",\"name\":\"Corina Cristea\",\"url\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/author\\\/corina-cristea\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting Against Cyberattacks - Radio Romania International","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/protecting-against-cyberattacks-id709221.html","og_locale":"en_US","og_type":"article","og_title":"Protecting Against Cyberattacks - Radio Romania International","og_description":"Three years ago, an aerial photo of camels in the Saudi Arabian Desert at sunset was named one of the best photos of the year by National Geographic. In this image, the camels are small white lines, and the black spots, which are shaped like camels, are just their shadows. The metaphor of this image [&hellip;]","og_url":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/protecting-against-cyberattacks-id709221.html","og_site_name":"Radio Romania International","article_published_time":"2024-03-08T11:02:45+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.rri.ro\/wp-content\/uploads\/2024\/02\/atac-cibernetic-securitate-hacker-size-1200-foto-pixabay-1.png","type":"image\/png"}],"author":"Corina Cristea","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Corina Cristea","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/protecting-against-cyberattacks-id709221.html#article","isPartOf":{"@id":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/protecting-against-cyberattacks-id709221.html"},"author":{"name":"Corina Cristea","@id":"https:\/\/www.rri.ro\/#\/schema\/person\/f9ab1cb3569dee1b2c033a814bb7f0fc"},"headline":"Protecting Against Cyberattacks","datePublished":"2024-03-08T11:02:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/protecting-against-cyberattacks-id709221.html"},"wordCount":956,"image":{"@id":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/protecting-against-cyberattacks-id709221.html#primaryimage"},"thumbnailUrl":"https:\/\/www.rri.ro\/wp-content\/uploads\/2024\/02\/atac-cibernetic-securitate-hacker-size-1200-foto-pixabay-1.png","articleSection":["The Future Starts Today"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/protecting-against-cyberattacks-id709221.html","url":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/protecting-against-cyberattacks-id709221.html","name":"Protecting Against Cyberattacks - Radio Romania International","isPartOf":{"@id":"https:\/\/www.rri.ro\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/protecting-against-cyberattacks-id709221.html#primaryimage"},"image":{"@id":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/protecting-against-cyberattacks-id709221.html#primaryimage"},"thumbnailUrl":"https:\/\/www.rri.ro\/wp-content\/uploads\/2024\/02\/atac-cibernetic-securitate-hacker-size-1200-foto-pixabay-1.png","datePublished":"2024-03-08T11:02:45+00:00","author":{"@id":"https:\/\/www.rri.ro\/#\/schema\/person\/f9ab1cb3569dee1b2c033a814bb7f0fc"},"breadcrumb":{"@id":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/protecting-against-cyberattacks-id709221.html#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/protecting-against-cyberattacks-id709221.html"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/protecting-against-cyberattacks-id709221.html#primaryimage","url":"https:\/\/www.rri.ro\/wp-content\/uploads\/2024\/02\/atac-cibernetic-securitate-hacker-size-1200-foto-pixabay-1.png","contentUrl":"https:\/\/www.rri.ro\/wp-content\/uploads\/2024\/02\/atac-cibernetic-securitate-hacker-size-1200-foto-pixabay-1.png","width":1200,"height":800,"caption":"(foto: pixabay.com)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/protecting-against-cyberattacks-id709221.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Homepage","item":"https:\/\/www.rri.ro\/en"},{"@type":"ListItem","position":2,"name":"Features and Reports","item":"https:\/\/www.rri.ro\/en\/features-and-reports"},{"@type":"ListItem","position":3,"name":"The Future Starts Today","item":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today"},{"@type":"ListItem","position":4,"name":"Protecting Against Cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/www.rri.ro\/#website","url":"https:\/\/www.rri.ro\/","name":"Radio Romania International","description":"Totul despre Rom\u00e2nia \u015fi rom\u00e2ni, \u00een 13 limbi\/dialecte!","inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.rri.ro\/#\/schema\/person\/f9ab1cb3569dee1b2c033a814bb7f0fc","name":"Corina Cristea","url":"https:\/\/www.rri.ro\/en\/author\/corina-cristea"}]}},"_links":{"self":[{"href":"https:\/\/www.rri.ro\/en\/wp-json\/wp\/v2\/posts\/709221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rri.ro\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rri.ro\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rri.ro\/en\/wp-json\/wp\/v2\/users\/108"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rri.ro\/en\/wp-json\/wp\/v2\/comments?post=709221"}],"version-history":[{"count":0,"href":"https:\/\/www.rri.ro\/en\/wp-json\/wp\/v2\/posts\/709221\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rri.ro\/en\/wp-json\/wp\/v2\/media\/597392"}],"wp:attachment":[{"href":"https:\/\/www.rri.ro\/en\/wp-json\/wp\/v2\/media?parent=709221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rri.ro\/en\/wp-json\/wp\/v2\/categories?post=709221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rri.ro\/en\/wp-json\/wp\/v2\/tags?post=709221"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.rri.ro\/en\/wp-json\/wp\/v2\/coauthors?post=709221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}