Cybersecurity
Definition
The term cybersecurity typically refers to the protection of computer systems, networks, and sensitive information from unauthorized access, theft, damage, or disruption.
Types of threats
Common threats include:
- viruses
- malware
- phishing attacks
- ransomware
- denial-of-service (DDoS) attacks.
Types of protective measures
Measures to protect against the more common threats include utilizing the following tools, systems and practices:
- Firewalls
- Antivirus Software
- Intrusion Detection and Prevention Systems (IDPS)
- Encryption.
Best practices
- Regular software updates
- Employee training and awareness
- Data backups
- Incident response planning
- Risk assessments
Why is it a concern?
Following a number of high-profile cases in recent years, businesses, governments, and individuals, have developed a higher awareness of the financial losses, reputational damage and legal liabilities that commonly follow a cyber attack. This has made it so that cybersecurity expanded from being simply perceived as a technical issue and, instead, being understood as a business issue, with broad implications on risk management, compliance and governance.
In turn, this has led to widespread advocacy for proactive and multi-layered security stances that take into account people, processes, and technology. As a result, several frameworks and standards have been developed, such as the NIST Framework, the ISO/IEC 27000 series, and the PCI DSS.
Summary
Cybersecurity is a rapidly evolving field, with new threats and vulnerabilities emerging constantly which, in turn, requires continuous monitoring, testing, and improvement of safety measures. It is essential for protecting sensitive information and ensuring the reliability and security of computer systems and networks.
For more content related to this topic, check out our Protect section.
![king's speech cybersecurity](https://www.techfinitive.com/wp-content/uploads/2024/07/d60132ec-7e2d-45ae-a506-7dfb2fb7124e-768x439.jpeg)
King’s Speech moves cybersecurity in the right direction
The King’s Speech has given us a much better idea of how the new Labour government will tackle cybersecurity challenges
![vpns business secure](https://www.techfinitive.com/wp-content/uploads/2024/06/6136d946-eb07-4327-9db5-c44e160f05a3-768x439.jpeg)
US federal agency warns that VPNs might not be secure enough for your business
Is your VPN secure enough? The CISA thinks the answer may be no, and Davey Winder can't help but agree as he casts his eye over recent attacks
![Thales ISO/IEC 27001:2022](https://www.techfinitive.com/wp-content/uploads/2024/06/FRESQUE-SALLE-CYBER-768x614.jpg)
Navigating ISO/IEC 27001:2022 requirements with Thales’ cybersecurity expertise
Organisations can fight back against ever-changing cyber-threats by establishing a robust framework for managing information security risks effectively - and that's where ISO/IEC 27001:2022 helps.
![small business ransomware attacks shown by buildings and factories under attack](https://www.techfinitive.com/wp-content/uploads/2024/06/2cc3dfbc-e934-42d7-854c-af759d263967-768x439.jpeg)
Ransomware resurgence gives small businesses cause for concern
A record number of smaller ransomware groups have appeared following the recent headline-grabbing takedowns of big names - and small businesses are in their crosshairs
![paris olympics medals for attacks](https://www.techfinitive.com/wp-content/uploads/2024/06/paris-olympics-medals-768x573.jpg)
Paris Olympics under threat as Russia favourite for hacking gold medal
The Olympic Games are due to begin on 26 July, but which four nations are lining up to compete for the hacking gold medal?
![Ransomware trends such as deepfake are on the rise shown by fractured face](https://www.techfinitive.com/wp-content/uploads/2024/05/ransomware-trends-768x512.jpg)
Ransomware trends: what’s on the increase and what’s going down
Davey Winder drills down into the detail from the latest security threat reports and explains why the way to fight attacks remains the same - even if the threats are changing
![leicester inc ransomware attack - city at night](https://www.techfinitive.com/wp-content/uploads/2024/04/leiecester-city-at-sunset-768x280.webp)
Is INC ransomware group’s Leicester attack motivated by damage rather than money?Â
Now that Leicester City Council has finally confirmed that it was hit by a ransomware attack, with INC claiming responsibility, we explore the motives of the group and the attack's consequences.
![uk cybersecurity shown by map with lots of red dots to show attacks](https://www.techfinitive.com/wp-content/uploads/2024/03/cyberattacks-uk-768x439.webp)
UK government’s “scarcely believable” cybersecurity survey makes grim reading for all sizes of business
British businesses need to wake up, shouts Davey Winder. Due to a lack of board engagement, they are leaving themselves wide open to cyberattacks.
![uk government ransomware strategy shown by giant ostrich outside house of commons](https://www.techfinitive.com/wp-content/uploads/2024/03/uk-government-ransomware-768x439.webp)
UK Government using an “ostrich strategy” against ransomware, says National Security Committee
The Joint Committee on the National Security Strategy has accused the UK Government of having an "ostrich strategy" on ransomware
![AI Cyber Defense Initiative represented by dozens of good bots fighting cyberattackers](https://www.techfinitive.com/wp-content/uploads/2024/02/AI-Cyber-Defense-Initiative-768x439.webp)
Can Google’s AI Cyber Defense Initiative come to the rescue of global cybersecurity defenders?
Google has announced a new AI Cyber Defense Initiative, but our security expert isn't convinced that it's going to work.
![Hunter-killer malware shown surrounding submarine](https://www.techfinitive.com/wp-content/uploads/2024/02/Designer-8-768x439.webp)
Your security defences will dive, dive, dive unless you sink hunter-killer malware
Hunter-killer malware is on the rise and represents a far-reaching change in how threat actors are able to both identify and counteract advanced enterprise defences.
![fragmented cybersecurity shown by digital locks](https://www.techfinitive.com/wp-content/uploads/2024/02/fragmented-cybersecurity-768x512.webp)
A fragmented cybersecurity landscape is weakening your defences, research suggests
Following best-practice security policies may actually be making your defences weaker due to the amount of time it takes to onboard new services
![cybernomics report shown through AI cyberattacker](https://www.techfinitive.com/wp-content/uploads/2024/01/cybernomics-report-768x431.webp)
Cybernomics report flags ransomware, GenAI and people as three big threats
Barracuda’s Cybernomics 101 report analyses the financial drivers behind cyberattacks and reveals a harsh reality: defending your data is expensive.
![spain ransomware shown by euro notes with handcuffs](https://www.techfinitive.com/wp-content/uploads/2024/01/spain-ransomware-768x465.webp)
Spain leads fight against ransomware gangs as Majorcan mayor refuses to pay €10 million ransom
The Mayor of Calvià , Majorca, is refusing to pay a rumoured €10 million ransom. And according to all the experts we've spoken to, that's the best possible move
![Ministry of Defence in London](https://www.techfinitive.com/wp-content/uploads/2024/01/ministry-of-defence-security-768x512.webp)
And the award for most insecure government department goes to… the Ministry of Defence
The Ministry of Defence (MoD), the UK government department with the most insecure network according to a recent critical report, is to spend £3 million on hackers to help hunt down vulnerabilities.
![play ransomware](https://www.techfinitive.com/wp-content/uploads/2023/12/play-ransomware-768x512.webp)
Play ransomware on the rise, warns FBI, but research points to yet more hidden dangers
As the FBI and Cybersecurity & Infrastructure Security Agency issue a joint warning to businesses about the Play ransomware group, ESET research reminds us that ransomware isn’t the only fruit.
![cyberattacks supply chain abstract representation with locks](https://www.techfinitive.com/wp-content/uploads/2023/12/cyberattacks-supply-chain-768x473.webp)
The supply chain cyberattack conundrum: secure consolidation or single point of failure?
Security expert Davey Winder investigates why cyberattackers are targeting the supply chain, and explains what steps businesses must take
![WhatsApp messages disappear](https://www.techfinitive.com/wp-content/uploads/2023/12/DALL·E-2023-12-11-14.27.06-A-16_9-image-depicting-a-vanishing-WhatsApp-icon.-The-icon-recognizable-by-its-green-speech-bubble-design-with-a-phone-handset-appears-to-be-dissolv-768x439.webp)
Make WhatsApp messages disappear to keep your business secrets safe
Find out how to make WhatsApp messages vanish after a set period
![chatgpt birthday cybersecurity](https://www.techfinitive.com/wp-content/uploads/2023/11/chatgpt-birthday-cybersecurity-768x431.webp)
ChatGPT is a year old today but not all cybersecurity experts are celebrating
It's not even a toddler, but ChatGPT has had a huge impact on cybersecurity. We speak to a range of security experts to discover whether they're celebrating or not.
![AI ethics and security depicted by judge holding gavel over AI symbol](https://www.techfinitive.com/wp-content/uploads/2023/11/nscsai-security-guidelines-768x512.webp)
NCSC AI development guidelines fall short, security experts say
Security professionals fear the NCSC AI development guidelines don't go far enough to protect developers or users, reports Davey Winder.