In-depth

What is cyber security?

To learn what cyber security is, you also have to know what it's not

Gone are the days where hearing a story about how a major international conglomerate lost millions of its customers' personal data through a data breach shocked us. Cyber attacks are no longer an abstract evil to which only the unlucky few became victims - they're everywhere now and seen, by and large, as an inevitability.

That's not to say cyber attacks have become inherently less scary, the likes of NotPetya and WannaCry may be things of the past but devilish malware is still found in the wild, tearing up systems worldwide. As the value of data increases, so does the demand for it which means businesses must keep iron-clad cyber defences if they want to avoid the debilitating GDPR fines that have already hit the tech giants.

But it isn't just the tech industry's heavy hitters that are subject to GDPR's fines, the UK's data protection watchdog is also known to come after the smallest companies for what might seem to some as small offences. With so much emerging technology being made available to businesses undertaking ambitious digital transformation projects, it's important to make security at the core of everything you do. Getting swept up in the thrill of AI and cloud computing is no excuse not to keep those endpoints secure and the SOC well-trained.

What cyber security isn't

When designing and implementing a cyber security strategy in an organisation, it's essential to establish first what it should and should not include. This is particularly important for smaller businesses where there are greater strains on available budgets and where skills may be in short supply.

Any strategy needs to make the most important business issues a primary focus, ensuring that nothing critical is overlooked. Cyber security will integrate and overlap with other areas of the business, but these blurred lines can often distract from the primary concern of the strategy.

This often comes up when businesses are assessing their data protection policies alongside cyber security. Although it's easy to conflate security and privacy, these two areas are distinctly different - putting up iron bars on a window is great for security but does nothing for privacy, while a curtain will have the opposite effect. Security policies should only focus on security, and leave privacy to a different strategy.

Cyber security is also often conflated with data backups. Having a good backup and disaster recovery strategy in place is essential for any business, however, it's no substitute for having robust security safeguards in place - particularly if your backups get wiped as part of an attack.

What cyber security is

OK, so what is cyber security then? The simplest definition comes by way of comparing and contrasting with information security: whereas information security is the protection of your data from any unauthorised access, cyber security is protecting it from unauthorised online access.

That was the simple definition, but for a more formal and comprehensive alternative you'd be hard-pressed to better the International Telecommunications Union (ITU) official take: "Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user's assets."

Cyber security is a process

Cyber security is not merely finding a solution to a specific problem, or indeed the problem itself. Cyber security is the process through which your business should go through in order to protect itself against evolving threats. This does include the tools and technologies needed to fight security threats, and also to maintain compliance, but it also includes the processes that everyone in your organisation should adhere to in order to make sure nothing slips through the cracks.

This means that your cyber security measures are something you should be constantly evaluating and updating accordingly. In terms of security hardware and software, this means investing in technology you trust and you know will be updated to respond to the latest threats and advances in security technology. For example, an OS that is supported and regularly patched, devices with the latest in endpoint security built in, or cloud-based services which are constantly updated.

Related Resource

Simplify cluster security at scale

Centralised secrets management across hybrid, multi-cloud environments

Download now

This process is also as much about making sure everybody in the business is up to speed with their role in keeping your organisation safe online as it is about keeping security technology running effectively. It’s no good having stellar endpoint security on company-issued devices if your staff are just going to use their own inadequately protected devices to access your data. Even if you have anti-virus software or firewalls, you still need to educate your employees to be cautious of things like phishing emails, and inform them of new threats as and when they emerge.

This year, in particular, has proved how crucial it is for companies to view security as an ongoing process rather than take a one-size-fits-all approach. Not only have cyber criminals seen huge potential in the disruption caused by COVID-19, but remote working poses its own huge set of cyber security challenges. Organisations must consider how lack of a centralised network and an inability to monitor of staff activity in the office affects security, and how staff behaviour may change in the home environment.

The bottom line

Keeping cyber security at the heart of everything your business does and what your employees do is of paramount importance. It's not merely another process nor is it something that should simply be tagged on to the end of a businesses growth strategy.

While it's ultimately down to the business' IT team to keep things secure, a company-wide awareness should always be in place – it's everyone's responsibility to safeguard themselves and their system. Whether it's spotting an innocuous-looking phishing email or flagging a crippling form of ransomware, everyone can play a role in protecting what matters most to your business.

Featured Resources

BCDR buyer's guide for MSPs

How to choose a business continuity and disaster recovery solution

Download now

The definitive guide to IT security

Protecting your MSP and your customers

Download now

Cost of a data breach report 2020

Find out what factors help mitigate breach costs

Download now

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Recommended

New report highlights the need for diversity in cyber security recruitment
cyber security

New report highlights the need for diversity in cyber security recruitment

28 Apr 2021
Defense Dept. expands vulnerability disclosure program to all publicly accessible defense systems
ethical hacking

Defense Dept. expands vulnerability disclosure program to all publicly accessible defense systems

5 May 2021
Security researchers take control of a Tesla via drone
ethical hacking

Security researchers take control of a Tesla via drone

5 May 2021
Best free malware removal tools 2021
Security

Best free malware removal tools 2021

5 May 2021

Most Popular

Dell patches vulnerability affecting hundreds of computer models worldwide
cyber security

Dell patches vulnerability affecting hundreds of computer models worldwide

5 May 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

29 Apr 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

30 Apr 2021