Newer reports indicate that Russians may be trying to steal sensitive data from Pakistanis in addition to the Israeli hackers who were reported to be targeting that country.

Newer reports indicate that Russians may be trying to steal sensitive data from Pakistanis in addition to the Israeli hackers who were reported to be targeting that country.

According to insider sources with knowledge of the situation, these Russian hackers are aiming for government institutions.

The federal government has warned all provincial governments, ministries, and divisions about these activities in a circular that was sent to them. The circular suggests using different servers for offline and online networks as advice for preventing cyber-attacks from a hacking network supported by Russia.

The circular says:

All file locations should be visible, as should incoming internet traffic, and user control should be improved. It also recommends limiting access to the internet to a small number of people and requiring digital code signing before using sensitive software.

Secure backups should be made of all sensitive data. Administrator-level passwords must be changed on a regular basis, and organisations must create a thorough plan to handle any emergency situation.

It is important to be aware that a recent government advisory cautioned against disclosing personal information to shady businesses and urged vigilance against Israeli hacking activities.

It is advised to avoid sharing personal information and documents on unauthorised websites in accordance with cybersecurity best practises.

To guard against hacking attempts, the recommendations also stress avoiding clicking on unidentified links. It’s also advised to use caution when connecting to public Wi-Fi networks and to refrain from downloading and installing unauthorised or suspicious applications on devices.

Cyber security is the practice of protecting networks, computers, servers, mobile devices, electronic systems, and data from malicious attacks. It is used in a wide range of contexts, including business and mobile computing.

As cyber-security experts identify new threats and new defences against them, security programmes continue to develop new defences. Employees must be trained on how to use end-user security software in order to get the most out of it.