Cybersecurity is the application of tools, technologies, policies, processes, controls, and procedures in the protection or recovery of networks, devices, systems and applications from digital attacks. The digital attacks are aimed at accessing, destroying and altering sensitive data, disrupting workflows and extorting money.

Cyber criminals deploy a broad range of attack types against organizations and individuals in order to compromise data confidentiality, integrity and availability.

  • Attacks on confidentiality are designed to steal sensitive information such as PII.
  • Attacks on integrity are meant to sabotage operations and inflict reputational damage.
  • Attacks on availability aim to prevent users from accessing data.

At the individual level, an attack could be the precursor for identity theft, extortion and the loss of irreplaceable data such as family photos.

Cybersecurity is the protection to defend internet-connected devices and services from malicious attacks by hackers, spammers, and cybercriminals. The practice is used by companies to protect against phishing schemes, ransomware attacks, identity theft, data breaches, and financial losses.

Look around today’s world, and you’ll see that daily life is more dependent on technology than ever before. The benefits of this trend range from near-instant access to information on the Internet to the modern conveniences provided by smart home automation technology and concepts like the Internet of Things.

With so much good coming from technology, it can be hard to believe that potential threats lurk behind every device and platform. Yet, despite society’s rosy perception of modern advances, Cyber security threats presented by modern tech are a real danger.