CURRENT THREATS TO CYBER SECURITY: STRATEGIES FOR PROTECTING PERSONAL DATA IN THE DIGITAL AGE
Keywords:
Cyber security, digital threats, personal data, privacy protection, encryption, digital literacy, Personal Data Protection ActAbstract
The development of digital technology has brought convenience to various aspects of life, but on the other hand, it has also given rise to increasingly complex cyber security threats. Personal data is now a prime target for attacks because it has high economic value and can be exploited for illegal purposes. The latest threats include phishing, malware, ransomware, data leaks, attacks on Internet of Things devices, and digital manipulation using deepfake technology. The complexity of these threats not only harms individuals, but also impacts organisational security, social stability, and public trust in the digital ecosystem. Therefore, personal data protection strategies are crucial in facing the ever-evolving dynamics of cyber attacks. Effective strategies for protecting personal data include the use of two-factor authentication, data encryption, regular system updates, and the use of artificial intelligence for early threat detection. In addition, improving public digital literacy plays a central role in preventing social manipulation, while legal regulations such as the Personal Data Protection Act are an important foundation for upholding individual privacy rights. With a combination of technology, regulation, and digital awareness, personal data security can be strengthened so that the risk of cyber threats can be minimised. This study provides a comprehensive overview of current threats and offers adaptive mitigation strategies in the digital age.
Downloads
References
A. Yusliwidaka. (2024). A Discourse of Personal Data Protection: How Indonesia Responsible under Domestic and International Law? https://journal.unnes.ac.id/journals/pandecta/article/view/13279
Abdullah Azizi, Mohammad Qias Mohammadi, Abdul Wahid Samadzai, & Abdul Qayum Shafaq. (2025). AI IN CYBER DEFENSE: PRIVACY RISKS, PUBLIC TRUST, AND POLICY CHALLENGES. https://journal.undiknas.ac.id/index.php/fisip/article/view/6278
AF Sadeli. (2023). Awareness of Personal Data Protection Law in Concern to Scientific Research. https://jurnal.unpad.ac.id/jkip/article/view/47526
Aleksandra Kuzior, Inna Tiutiunyk, Anetta Zielińska, & Roland Kelemen. (2024a). Cybersecurity and cybercrime: Current trends and threats. https://jois.eu/files/12_1441_JIS_Tiutiunyk%20et%20al.pdf
Aleksandra Kuzior, Inna Tiutiunyk, Anetta Zielińska, & Roland Kelemen. (2024b). Cybersecurity and cybercrime: Current trends and threats. https://jois.eu/files/12_1441_JIS_Tiutiunyk%20et%20al.pdf
Ana Sofa Yuking. (2018). Personal Data Protection in Indonesia: Legal Perspective. https://ijmmu.com/index.php/ijmmu/article/view/1773
B. Dupont. (2022). Cyber resilience revisited: Law and international relations.
Bolderston, A. (2008). Writing an Effective Literature Review. Journal of Medical Imaging and Radiation Sciences, 71–76.
Csirt BPIIP. (2025). Ancaman Siber 2025: Indonesia Harus Waspada AI Agentik. https://csirt.bpip.go.id/posts/ancaman-siber-2025-indonesia-harus-waspada-ai-agentik
D. Febriawan. (2024). Understanding Indonesia’s Cyber Security Policies and Strategies.
Diskominfo Sukoharjo. (2025). Tips Melindungi Data Pribadi. https://diskominfo.sukoharjokab.go.id/berita/tips-melindungi-data-pribadi-1
Dudy Heryadi, Robby Rizaldi, Tia Panca Rahmadhani, Feby Diah Miranti, & Febyanti Juliastica. (2024). Indonesia’s Role as A Cyber Protector in Southeast Asia. https://jurnal.idu.ac.id/index.php/DefenseJournal/article/view/13097
Elitery. (2024). Keamanan Siber dalam UU Perlindungan Data Pribadi. https://elitery.com/articles/penerapan-keamanan-siber-dalam-menunjang-uu-perlindungan-data-pribadi/
Eliyah, E., & Aslan, A. (2025). STAKE’S EVALUATION MODEL: METODE PENELITIAN. Prosiding Seminar Nasional Indonesia, 3(2), Article 2.
F. Cremer. (2022). Cyber risk and cybersecurity: A systematic review of data availability. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8853293/
F. Rafiq. (2022). Privacy Prevention of Big Data Applications: A Systematic Review.
Graduate BINUS University. (2024). 7 Jenis Ancaman Cybersecurity terhadap Keamanan Data. https://graduate.binus.ac.id/2024/02/07/7-jenis-ancaman-cybersecurity-terhadap-keamanan-data/
H. Maliha. (2024). Cybersecurity and Fintech Studies in Academic Discussion.
J. Järveläinen. (2025). Towards a framework for improving cyber incident reporting.
Karier.mu. (2024). Cara Melindungi Informasi Pribadi di Era Digital. https://www.karier.mu/blog/umum/cara-melindungi-informasi-pribadi-di-era-digital/
ME Susila. (2024). Cyber Espionage Policy and Regulation. https://journal.unpad.ac.id/pjih/vol11/iss1/2/
MF Adhiwisaksana. (2023). Personal Data Protection with Foreign Element as Private International Law Issue.
MF Asyrofi. (2025). Cybersecurity Of Work From Anywhere Model For Government.
Naeem AllahRakha. (2024). Cybersecurity Regulations for Protection and Safeguarding Digital Assets (Data) in Today’s Worlds. https://journal.unnes.ac.id/journals/lslr/article/view/2081
Najamuddin Gani. (2024). Legal Politics and Data Protection in Indonesia: A Case Study of the National Data Center Hacking. https://fhukum.unpatti.ac.id/jurnal/sasi/article/view/2213
P. Swire. (2024). Risks to cybersecurity from data localization, organized by jurisdiction.
R. Anggriawan. (2022). Passenger Name Record Data Protection under European Regulations.
R. Ayunda. (2023). Personal Data Protection to E-Commerce Consumer: Challenges and Legal Certainty.
R. Ducato. (2020). Data protection, scientific research, and the role of information.
Reno Andre Permana. (2025). Analisis Metode dan Teknologi untuk Perlindungan Data dan Informasi dari Ancaman Siber. Jurnal MENTARI Manajemen, Pendidikan Dan Teknologi Informasi, 3(2). https://journal.pandawan.id/mentari/article/view/744
S. Busetti. (2025). Evaluating incident reporting in cybersecurity: Theory-based evaluation.
S. Slapničar. (2022). Effectiveness of cybersecurity audit.
S. Watini. (2024). Cybersecurity in Learning Systems: Data protection and security concerns.
ST Hossain. (2025). Cybersecurity in local governments: A systematic review and framework of key challenges.
T. Daim. (2024). Monitoring cybersecurity technology through the years.
Titis Pandan Wangi Reformasi & Hasrul Buamona. (2024). Cybersecurity Law Exploration: Personal Data Protection in 2023. https://journal.formosapublisher.org/index.php/jlca/article/view/10376
W. S. Admass. (2024a). Cyber security: State of the art, challenges and future directions.
W. S. Admass. (2024b). Cybersecurity: State of the art, challenges and future directions.




