If you want to be a true cyber security expert, an online information technology degree is the best path. However, anyone can protect themselves from common crimes committed online.

Hands on a computer keyboard. An image of a lock is superimposed on the computer screen.

Personal computing pioneer Mitchell Kapor once said, “Getting information off the Internet is like taking a drink from a fire hydrant.” It’s true that the Internet is a seemingly endless source of useful information—but because users can be naturally vulnerable, it’s also become the go-to point of attack for criminals worldwide.

Cyber crime first came onto the scene in the 1970s, long before we ever realized a need for antivirus software, information technology degrees, or cyber security. Back then, hackers would break into computerized phone systems in order to make free long-distance calls. Today’s crimes are far more sophisticated—and far more dangerous. In fact, according to a 2017 report by the world's largest dedicated security company, McAfee, cyber crime costs the global economy more than $600 billion a year.1

Walden Offers 80+ Online Programs to Move Your Life Forward, find your program now.
While there are a number of government and law enforcement agencies working behind the scenes to combat illegal Internet activities, it’s important to recognize the top forms of cyber security breaches and understand how to protect yourself.2
Type The Scam Prevention Tip

Phishing websites are designed to mimic legitimate sites in hopes of tricking consumers into entering their most sensitive data.

Use a phishing filter on your Web browser to scan for websites that have been identified as phishing sites.
Identity Theft Cyber criminals who have gained access to your credit card or banking account may make purchases in your name. Closely monitor your accounts and report any suspicious e-mails, websites, or pop-up surveys.
Online Harassment Online threats are sent through social media outlets in order to bully and harass. Report bullying activity, even if you know the person, and keep a close watch on the online activities of your children.
Cyber Stalking Cyber stalkers may monitor online activities using malware and are known to harass their victims and even contact acquaintances in an effort to slander them. Treat cyber stalking the same way you would online harassment and report the activity to the authorities.
Invasion of Privacy Hackers interested in intruding on someone’s personal life will hack into their computer, read e-mails, and monitor their online activities. Install and update antispyware or antivirus programs for protection.

In the world of cyber crimes, the range of threats grows just as fast as new technologies, making information security a fast-growing field. In fact, according to the U.S. Bureau of Labor Statistics, employment of information security analysts is predicted to grow as much as 28% by the year 2026 and they have a median pay of $98,350.3 To meet that demand, more students are choosing online learning degrees related to the cyber security field, such as a BS in Information Technology or even an IT master’s degree such as an MS in Cybersecurity.

There is no doubt that we’ll count on the next generation of information security specialists to make new strides in the area of online security. However, in the meantime, it’s important to remember that we all have a role to play in protecting ourselves and combating cyber crime.

Walden University is an accredited institution offering online information technology degrees at the bachelor’s, master’s, and doctoral level. Expand your career options and earn your degree in a convenient, flexible format that fits your busy life.

*McAfee Center for Strategic and International Studies, Net Losses: Estimating the Global Cost of Cybercrime, on the Internet at www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf.

†Enigma Software, “Top 5 Popular Cybercrimes: How You Can Easily Prevent Them,” on the Internet at www.enigmasoftware.com/top-5-popular-cybercrimes-how-easily-prevent-them.

‡Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, Internet Security Analysts, on the Internet at https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm

Man sitting at latop
Whether looking for information on programs, admissions, or financial aid, we're here to help.
Whether looking for information on programs, admissions, or financial aid, we're here to help.
Talk to your personal enrollment advisor for more information today. Please use our International Form if you live outside of the U.S.
Talk to your personal enrollment advisor for more information today. Please use our Domestic Form if you live in the U.S.
*Required Field
Academic Interests
Contact Information
Invalid email address
Please provide a valid phone number
Please provide a valid zipcode
Additional Information
Get Started

By submitting this form, I understand and agree that Walden University may contact me via email, text, telephone, and prerecorded message regarding furthering my education and that calls may be generated using automated technology. You may opt out at any time. Please view our privacy policy or contact us for more details.


By checking this box, I agree that Walden University may contact me by email, text message, autodialed telephone call, and prerecorded message at the contact information provided above regarding opportunities and offers to further my education. I understand that I may withdraw my consent at any time and that my consent is not a condition of any purchase. I have received the Walden University Privacy Policy