Understanding the Risks: Cybersecurity Concerns for Elders

Share

To understand the cybersecurity Risks and Concerns for elders, it is important to understand generations. Every person collectively born and living at the same time defines a generation. It is a period that is about 20-30 years when children are born and mature. People born from 1928 to 1945 define the Silent Generation. Baby Boomers are the people born between 1946 to 1964, post World War II. Later preceded by Generation X born during 1965-1976. Meanwhile, Millennials or Generation Y were born between 1977-1995 and then Generation Z was born between 1996-2015. People commonly refer to individuals from the Silent Generation and Baby Boomers as oldsters or elders.

The progression in mobile, computers internet technologies, etc has taken place well into the middle of elders’ life cycle. As it is evident that elders are stereotyped and less tech-savvy, they are facing challenges with technology. The emergence of mobile and internet technologies is increasing functionality for elders in every aspect of life. Mobile devices have become more affordable, accessible, and easy to understand for every generation while elders are not comfortable with them. For them adopting mobile technology usually means connecting to the newly emerging cyberworld and using internet technologies aberrantly.

Elders in their lives usually have decreased reactivity which ultimately causes issues to keep up with rapidly growing technology. There is a condition called “leathery fingers” which makes touch screen use difficult for elders. According to European Commission statistics, 9% of elders at age 75 or above have serious visual ailments. 18% have challenging hearing issues. It is well evident that due to different aging processes elders are unable to partake actively in the mainstream Hi-tech cyber world. According to Pew Research Centre, USA, 23% of elders have physical or different ailments that make reading challenging for them. 77% of elders need assistance in the learning of smartphones or tablet operations. And 55% of elders need help to get connected with family and friends on different social media forums. Further reports suggest that around 80% of elders use the Internet on a weekly basis.

Increasing pressure for the adaptation of mobile and internet technologies is mounting for elders. They have to learn new capabilities for better compliance with technologies. As well as an understanding of how computers and the internet can support their transition from conventional daily interactions to the Hi-tech cyber world. These pressures are not only social but also economic. Major organizations whether public or private like healthcare, retirement monetary benefits, banks, and other living assistance arrangements are switching to digital operations. Which is in fact, accelerating towards adaptation and learning for elders’ digital experience with very little training. 

During the COVID-19 pandemic, elders had to use these technologies for their essential tasks. Many elders who were suffering from isolation switched to internet-enabled devices. Internet somehow decreased their suffering during the Covid-19 pandemic. But made them more vulnerable to cybercrime and cybercriminals used this opportunity to their advantage as well.

Cybercrime Phenomenon

When computers and internet technologies are used as a medium for committing crimes such as stealing IDs, hacking, online fraud, etc., it is termed cybercrime. With the advent of computer and internet technologies, a new space has emerged known as cyberspace. Cybercrime exists in cyberspace and has implications in the physical world. People around the world who are using internet technologies have very limited knowledge regarding cybercrime. Which is severely impacting individuals’ lives and societies. 

The exponential growth of computer and internet technologies has also provided vast opportunities to criminals for carrying out conventional crimes digitally in cyberspace. Cyber like fraud, harassment, extortion, etc. The evolution of internet technologies has impacted positively the well-being of humans globally. But it will certainly lead to the transition of cybercrime and could attract more criminals to cyberspace. Every person or organization who is using internet technology is vulnerable to cybercrime. Elders are the most vulnerable group due to their deprived knowledge and skills regarding ever-changing innovations and technologies.

Varieties of Cybercrime Against Elders

Some major cybercrimes being committed against elders are:

Social Engineering

In the cyber world, social engineering is the act of using psychological manipulation to trick Information Technology users into making mistakes, leading them to reveal their confidential information to criminals. Criminals can carry out various types of social engineering during human interactions anywhere. Elders are the vulnerable targets for social engineering.

Phishing Emails

When a criminal design and send deceptive emails to trick a person into revealing confidential information or to install malware (Malicious Software) in their system is called a phishing email.

The impersonation of victims and the content of these emails varied according to criminals’ objectives. Phishing is the most common cyber-attack against elders attempted by cybercriminals by far.

Ransomware

Ransomware is a type of cybercrime in which criminals impersonate victims. Mostly through emails as an authoritative person from any legitimate organization. In these emails they send an attachment, masquerading as something victims should trust. These attachments have malware, once they download the attached files and open them, it encrypts the files in their system. Due to the encryption of files, victims can’t access files anymore. Cybercriminals then demand money to restore or decrypt the files.

Hacking

It is an attempt by criminals referred to as hackers to gain unlawful access to digital devices, like computers, tablets, smartphones, and sometimes even the entire network of the organization. Elders’ digital devices are easy to hack with the help of social engineering. Cybercriminals hack computers and mobile devices mostly for monetary gain. They steal confidential information which they later use to draw money. They steal login credentials of the victim’s social media account and disseminate inappropriate content from their account to their family and friends. It is a very common method to blackmail and extort a large sum of money from elders.

Medical card and fraud

Health Care Fraud

In this type of cybercrime, criminals usually offer free health products to elders but charge insurance or other services. Most of the time, these products are unnecessary or may not be delivered to victims. Sometimes, individuals at community clubs, health clubs, shopping malls, etc., give fake or unnecessary tests to elders and submit the bills to insurance companies.

Prevention against cybercrime 

Unreported elder frauds worldwide are the main reason that prevents elders from seeking assistance from law enforcement agencies, protective health service providers, and other family members. Lack of reporting of elders’ crimes encourages cybercriminals to target and victimize other elders of the society. So, elders must report any cybercrime to authorities or family members as soon as possible. 

Caregivers or family members should have close ties with their elders and educate them regarding cyber offenses. They should build trust and encourage elders to share their concerns, as elders often feel ashamed and fear reporting cyber offenses against them might result in restrictions on managing their financial resources

Elders should contact their financial institutions to give them awareness regarding cyber threats and institutions themselves should initiate awareness programs regarding cybercrime, especially for elders and females, as they are appropriate and vulnerable targets for cybercriminals.

Passwords are the most important defense against any cyber intrusion. It is important to use stronger passwords that should include uppercase, lowercase, numbers, and symbols.

The length of the password should be at least 16 characters and do not use personal information such as age, name, date of birth, family member’s name, pet’s name, favorite color, etc. 

Never share your password with anyone, change them frequently, and avoid using the same passwords repeatedly.

Always check your surroundings before entering a password as shoulder surfing is a common method for stealing passwords.

It is very important to install the latest antivirus software on devices and update them regularly, as it is the first line of defense against many cyber attacks.

They should keep a backup of their important data to avoid any loss of data in case of hacking and malware attacks.

Cyberstalking presents a significant issue, particularly for elders, and individuals can only mitigate it by restricting themselves from sharing or disclosing personal and sensitive information on any social media forums.

It is important to avoid intimating with strangers online and sending personal pieces of information like pictures, personal videos, or details regarding their family, careers, etc.

Always avoid installing unnecessary applications and need one from third-party websites.

It is important to keep credit cards and other sensitive credentials secure and always check the legitimacy of the website before using your financial credentials.

As fat finger syndrome is very common among technology users, always check the spelling of websites carefully while typing address on URL.

Avoid clicking any suspicious link sent by unknown sources as cybercriminals drag sensitive information by redirecting users to their rogue websites.

Don’t use public computers or anyone else system for sensitive emails, online banking, etc.

Every individual in society especially elders needs to have awareness regarding cybersecurity in this digital era. Through awareness, we can mitigate the vulnerabilities of individuals and organizations. It will not only reduce the number of cybercrime victims but also other cyber breaches. 

About the Author

Syed Irfan, PhD. Scholar Cyber Criminology. He is certified Cyber Security professional from a recognized institution, and has excellent sets of practical skills and intellectual knowledge regarding all those deviant activities of cyber criminals. That are aimed at breaking into a computer or computer network, crime on social media and computer assisted crimes. He also serves as consultant and Trainer to Employees, Senior Management and Top Tier of different elite organizations.

This Post Has One Comment

  1. Fatima

    Best article on this topic so far🙌🏻

Leave a Reply