Cybersecurity
Definition
The term cybersecurity typically refers to the protection of computer systems, networks, and sensitive information from unauthorized access, theft, damage, or disruption.
Types of threats
Common threats include:
- viruses
- malware
- phishing attacks
- ransomware
- denial-of-service (DDoS) attacks.
Types of protective measures
Measures to protect against the more common threats include utilizing the following tools, systems and practices:
- Firewalls
- Antivirus Software
- Intrusion Detection and Prevention Systems (IDPS)
- Encryption.
Best practices
- Regular software updates
- Employee training and awareness
- Data backups
- Incident response planning
- Risk assessments
Why is it a concern?
Following a number of high-profile cases in recent years, businesses, governments, and individuals, have developed a higher awareness of the financial losses, reputational damage and legal liabilities that commonly follow a cyber attack. This has made it so that cybersecurity expanded from being simply perceived as a technical issue and, instead, being understood as a business issue, with broad implications on risk management, compliance and governance.
In turn, this has led to widespread advocacy for proactive and multi-layered security stances that take into account people, processes, and technology. As a result, several frameworks and standards have been developed, such as the NIST Framework, the ISO/IEC 27000 series, and the PCI DSS.
Summary
Cybersecurity is a rapidly evolving field, with new threats and vulnerabilities emerging constantly which, in turn, requires continuous monitoring, testing, and improvement of safety measures. It is essential for protecting sensitive information and ensuring the reliability and security of computer systems and networks.
For more content related to this topic, check out our Protect section.
Cybersecurity: The 2022 Board Perspective (Year in Review)
Proofpoint and Cybersecurity at MIT Sloane surveyed 600 board directors around the world. Download the report to read their findings.
Securing Microsoft 365
This e-book explores modern threats, best practices for protecting users and data, and what capabilities to look for when enhancing your Microsoft 365 defences
Redefining Data Loss Prevention (DLP)
Why insider threat management should be a critical part of your data loss prevention program.
2023 State of The Phish in Asia-Pacific
Download 2023 State of the Phish: Asia-Pacific and Japan to learn the biggest regional cyber threats and how to make your users your best defense.
Protecting the End User
This gated guide reveals how companies can best assess and mitigate user risk and how they can use that information to implement a successful and people-centric cybersecurity strategy.
Cisco Encrypted Traffic Analytics
The rapid rise in encrypted traffic is changing the threat landscape. As more businesses become digital, a significant number of services and applications are using…
Guards vs Firewalls: Ensuring Secure Data Transfer
Learn when software guard technology may be a better solution than available firewall technologies. Government and commercial entities are constantly on alert to prevent and…
Cyber Threat Predictions for 2023
An Annual Perspective by FortiGuard Labs While “less is more” is the critical strategy behind consolidating networks and security, “more is more” seems to be…
Best Practices for Selecting a Vulnerability Management (VM) Solution
With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right…
Malware Review: A Look Back and a Look Forward
Like any threat, malware evolves. To stay in front of ransomware, credentials theft, and more, download the Cofense Malware Review. Get insights from Cofense Intelligence…