top of page
close-up-businessman-with-digital-tablet.jpg
Writer's pictureKehinde Soetan

Cybersecurity: What does it really mean?


Cybersecurity aims to protect a system, computer hardware, software, and data from unwanted intrusions - which is generally called a cyber-attack. The threats in which cybersecurity is meant to protect against includes but is not limited to: the unauthorized access or misuse of information, the unauthorized deletion or alteration of information, the dissemination of illegal, obscene, threatening, or other dangerous content by unauthorised actors. Properly enforcing cybersecurity usually involves enforcing best practices in security software, firewalls, secure coding, and cybersecurity education. Security is everyone's business and while devices like firewalls and security softwares are effective, no cybersecurity strategy is completely effective unless users play a role in enforcing it.


With more devices connected to the internet and cybersecurity playing a bigger role in business and industry, the field of cybersecurity is becoming more important than ever in our day-to-day lives. There are lots of risks and threats in the digital world. As much as risks and threats exists and should be taken care of, it should be noted however that better security could also mean less convenience. For individuals, this can mean reducing the need to obtain and manage more passwords and PINs. For organizations, it means fewer data loss incidents, breaches, and service outages, all of which can be costly and result in loss of income, reputation, and customer goodwill.


Understanding how your data should be kept is a very important aspect of cyber security. Understanding also who is responsible for keeping data safe, what protection levels are required to keep data safe, how long data should be kept for, the cost involved with the safe keeping of data, the infrastructure needed to keep data safe, who is responsible for protecting and keeping the infrastructure safe are many other aspects that should be understood as well. Understanding first what you are backing up and second, where that data is being kept is also very crucial.


Shaping a global environment in which all people are able to securely use, honestly exchange, and enjoy all the benefits of the internet is an urgent need.

Thus, to reach this level of technology and information comfort among people without endangering their daily routines - credible cybersecurity tools with minimal security overload must be engineered and efficiently operated.


Additionally, industry efforts to address the cyber-job gap must be combined in order to enable and protect practitioners, managers, and decision-makers at all levels to handle more powerful advanced cybersecurity functions.


Need help with training your teams / leaders ?

47 views2 comments

Recent Posts

See All

2 Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
Guest
Jul 16
Rated 5 out of 5 stars.

great article

Like

Guest
Jul 15

This is a good read

Like
bottom of page