Cyber Security


Cybersecurity is the protection of systems from attacks, simply said.

Nowadays we have tons of organizations and companies that are driven by rooms filled with servers. These servers include everything about confidential documents, Social media, ideas and advertisements- and from great information comes great responsibility. I could ask any person on the street to see their phone and personal matters, but they would say no. That’s the exact principle of Cyber Security- to lock down what is yours, so others don’t get access to restricted permissions.

Why is it important?

Cyber Security is extremely essential and will continue to be as the world develops into higher and more advanced stages of a digitalized future. The more technology that is invented, the more security is needed to make sure it won’t be broken down in any sort of way.

In addition, Cyber Security is more than just hacking and coding. If you think Cyber Security is just like any TV series like Mr. Robot, I got some bad news for you, son.

Elements of Cybersecurity

Application Security

Application security is the measures taken to improve the security of applications and software. This is often done by looking for vulnerabilities and finding or fixing them to prevent exploits. Any software that you run needs to be protected and usually is. Unfortunately, any application can contain holes or vulnerabilities that hackers can use to infiltrate your network.

Have you heard of viruses that install lots of pop-ups on your computer or delete files without your consent? Bingo.

Information Security

Information Security is the practice of preventing “unauthorized access”. Information Security makes sure no one can modify, inspect or destroy information. Whether it is your nudes or some school documents. They mainly focus on balanced protection of confidentiality, integrity, and availability of data. All this while still maintaining a focus on staying efficient without interrupting the productivity of the organization or overall working with projects.

Not to be confused with the term “Infosec” which is synonymous with the overall aspect of cybersecurity.

Network Security

Imagine you’re sitting at home and enjoying some Netflix with your boo, but for some reason, the video keeps buffering with your Gigabit network. Your neighbor is infiltrating your network and probably using it as a part of a botnet. This is unacceptable and is the reason to why we want to make sure our network is protected and secure so strangers, attackers or even neighbors have the ability to break in.


Data loss prevention

Organizations have to make sure that in case something happens to their data, they still have it. Therefore, we have backups -Great invention. We also want to make sure that our personal staff doesn’t do something they shouldn’t, like stab us in the back and sell confidential files that don’t belong to the outside world- which is why we lock down our data so only people who should be reading them can.

Recovery/Business continuity planning

“Plan B” as I like to call it, Is the creating of a strategy needed as we face threats and risks in a company. Of course always with an eye to ensure that personnel and assets are protected and able to function even in the event of any disaster. This is the last attempt to secure and lock down an environment if all the preventive measures didn’t keep up.

End-user education

The “most effective way” to make colleagues understand the newest threats. Because the truth is, many organizations’ corporate cultures lack the security basics of working in this digital age. For example, do your employees know not to plug any foreign USBs- even from home- to the office? Or are they aware of what a worm or ransomware is, and what damage it can do to the entire network if someone gets infected?


Ransom demands from cyber criminals are fairly small

Over half of ransom demands from cyber criminals to small and mid-sized businesses are for less than $1,000. However, there are still a fair proportion of criminals who ask for much larger sums, with 42% asking for more than $1,000 and 3% demanding a whopping $50,000 to $150,000 to release files. Survey respondents reported that more than two in five UK organizations opted to pay the ransom demand in the most serious ransomware attack.

Malware infiltration through email is the top security concern

For 85% of organizations, the top concern is malware infiltration through email, closely followed by phishing through email. For both of these attacks, email servers only form part of the defense, and businesses are reliant on staff being able to identify suspicious emails.


Now that you have a broader aspect of knowledge within Cyber Security, perhaps you understand why it can be a big deal to a lot of companies or homes as well.

Learning Cyber Security is not just for a job or for a school, but it’s also for educating yourself as you are exposed to many threats every single day and almost every hour when it comes down to it all. If you want to learn more about how to make sure you’re safe, and perhaps learn more about security, take a look at the series End User Awareness where I break down everything in both threats and preventive measures.