Section 2.05 Cyberspace Marketing

 


What is Cyber?

It is related to computer technology, the use of information and data and the virtual reality world. 

Today, using the internet, online tools and social media platforms are part of our everyday life. Like everything else in life, it depends on how a person uses it, for good or bad. 

Caution has to be taken whilst entering the internet virtual space because we are not in control of what others want to do.  

For the purpose of this lesson, we separate the subject of cyber or cyberSpace into two topics of CberSpace Marketing and Cyber security. 

The subject of CyberSpace Marketing was created by Melvin Mayard and is not to be found anywhere until it catches on when the importance is realised.  In brief, it is about the person users and receiver how to be cautious whilst exploring the virtual and working online.          

Cyberspace Marketing is more than just a fancy word for marketing advertising, it is the Danger of Marketing Advertising with Psychological Tactics designed to intentionally affect a person with the acronym (T.A.C.T.I.C.S); 

Taking you into unexpected areas/links.  

Acting to gain your attention long-term.

Controlling the person’s thinking process.     

Tracking your personal details. 

Insisting that you take up their offers.

Causes psychological pressure on your decision-making process. 

Seeking to sell to you something irrespective of your wants and needs. 

Quote: Cyberspace Marketing is a threat against the individual online or offline – Melvin Mayard. 

Therefore, we encourage everyone to learn ‘Cyberspace-marketing’ as you go online be warned, remember to take precautions and be aware of the following;

  • Don’t react to Ads unless it’s related to your Goals
  • Don’t Browse as you will always come across something NEW 
  • Stay Cautious on every page you go 
  • Stay Dedicated to a time limit online 
  • Don’t Explore without expectation   
  • Stay Focused on your purpose of going on the internet 
  • Be Goal oriented with your online time
  • Be aware of your Habits whilst you are online
  • I just ‘want to see’ curiosity, but it is NOT an expectation or goal 

When you want to make your home secure, you lock the door. When you want to prevent your bike from being stolen, you use a bike lock. When you want to protect your valuable possessions, you keep them in a safe. But what do you do to protect your identity online? 

How to Protect Yourself Online

Anyone can become vulnerable online to scammers and hoaxes. Most people are less likely to report fraud because they may not know how to report a scam or they may be ashamed about being the victim.  

There are hundreds of ways and tricks to scam an individual,  financial abuse, which occurs when an individual misuses their privileged access to a person’s financial information and steals their money.

Scammers also pretend to be in emergency circumstances, claiming to be your unknown relative or other loved one. These scammers usually say they’re in trouble — in jail, in the hospital, in a foreign country — and they need money right away. They could sound compelling, using personal family information they had obtained online to fool you. Beware of cyberSpace Marketing and cybersecurity!! 

What is Cybersecurity?

Cybersecurity is simply a term for technologies, practices and processes used to protect your online information from unauthorised access or misuse. Every day, people play a part in cybersecurity when they follow internet safety tips and cybersecurity best practices. 

Modern life is fundamentally intertwined with the internet. Nearly every daily task now has the opportunity for online integration, and almost everyone owns multiple devices, including laptops, phones, tablets, smartwatches, smart TVs and more. The more accounts and devices you have online, the greater the potential for criminals to access your personal information and take advantage of you via the devices.  

Online safety is important no matter your age or life stage, but there are particular concerns for certain vulnerable groups like newbies to the internet, first-time users (as everyone would fall into this category at some point), children, teenagers and senior citizens.

Cybersecurity analysts protect computers and other digital devices linked to networks from cyberattacks and unauthorized access. They do this by trying to anticipate scenario thinking to defend against the threats and design a responding process to secure the breaches when they do happen to protect the organization’s valuable people’s data. 

There are two types of cyber security protection,

  1. program coding that serves a specific business 
  2. Customers’ and employees’ data are collected for business purposes. 

Learning Cybersecurity 

Cybersecurity is a growing industry with projections to grow by 15-20% by 2025.

Learning cybersecurity can be a great career as well and not as challenging as any other subject if you have an interest, especially if you’re passionate about technology.  Anyone can learn it as a career progression. 

Skills Required for Cybersecurity Jobs are,

  • Problem-Solving Skills. 
  • An Understanding of Hacking.
  • Communication Skills.
  • Technical Aptitude. 
  • Attention to Detail. 
  • Fundamental Computer Forensics Skills. 

Cybersecurity as a subject

Anyone can learn cybersecurity with whatever skills and experience they may already have.  

This course does not teach coding for cybersecurity or analysts Code, but no one must learn the basic concept of cybersecurity before operating online to take precautions for protecting their digital devices, intellectual property, and Data.

6 steps to Protect your device 

1. Start with accessing a device and ensure it is protected with a ‘very strong’ password.

Never share it with others no matter who they may be, think twice even with those you are in a relationship with.  Often they are tempted to do things when they know your password they would not do on their own account! It’s a form of experimenting safely for them against the other person’s knowledge with the idea that ‘what they don’t know won’t hurt them’.  

2. Always ultimately sign off the page before closing the page. There is a big difference between the two, and it is not often realised. Signing off the page is actually signing off the account. Whilst pressing the ‘x’ at the top right-hand side of the page only closes down the page, in reality, it only minimises the page but does not sign you off the account!  

SO SIGN OFF THE ACCOUNT AND CLOSE THE PAGE. 

3. Use of an Anti-virus that is designed with two-fold purposes

  • to stop personal data and bank details from being stolen.
  • to stop attacks against the device with the purpose of damaging the program perhaps after stealing Data so the thieves are not traced by officials.  

4. Do not leave your computer or devices unattended giving access to others by negligence. Leaving devices signed in and into any account is like leaving your bank account open for anyone to help themselves!

5. If sharing system passwords and wifi, ensure the password is changed when people are no longer part of the team or the business. Ensure to change the password regularly. 

6. One step that is hardly thought of is to dispose of your old equipment securely by removing the Hard Drive and destroying it entirely to laminate access to any Data.

Cyberspace security is about protecting against the threat on digital devices and your Data – Melvin Mayard.

Summary

Remember this lesson is about the two main subjects, 

  • CyberSpace Marketing – focus on marketing against you.
  • Cyber Security – focus on your devices and data.

Quote: Marketing’s job is never done. It’s about perpetual motion. we must continue to innovate every day 

Extra Reading

2.05 Internet Security Tips and Information (1)

ACTIVITY 2.05

List two cyberspace marketing warnings you have learned and what you will do to improve your behaviour

a.

b.  

Please grade yourself on this section.

(Automated self-grade) 

  1. excellent
  2. Good
  3. ok 
  4. bad

Please provide your feedback on the section.

Post a comment

Leave a Comment

Your email address will not be published. Required fields are marked *