What is cyber security all about?
A successful cyber security approach has multiple layers of
protection spread across the computers, networks, programs, or data that one
intends to keep safe. In an organization, the people, processes, and technology
must all complement one another to create an effective defense from cyber
attacks. A unified threat management system can automate integrations
across select Cisco Security products and accelerate key security operations
functions: detection, investigation, and remediation.
People
Users must understand
and comply with basic data security principles like choosing strong passwords,
being wary of attachments in email, and backing up data. Learn more
about basic cyber security principles.
Processes
Organizations must have
a framework for how they deal with both attempted and successful cyber attacks.
One well-respected framework can guide you. It explains how you can
identify attacks, protect systems, detect and respond to threats, and recover
from successful attacks. Watch a video explanation of the NIST
cybersecurity framework
Technology
Technology is essential
to giving organizations and individuals the computer security tools needed to
protect themselves from cyber attacks. Three main entities must be protected:
endpoint devices like computers, smart devices, and routers; networks; and the
cloud. Common technology used to protect these entities include next-generation
firewalls, DNS filtering, malware protection, antivirus software, and email
security solutions.
Why is cybersecurity important?
In today’s connected
world, everyone benefits from advanced cyberdefense programs. At an individual
level, a cybersecurity attack can result in everything from identity theft, to
extortion attempts, to the loss of important data like family photos. Everyone
relies on critical infrastructure like power plants, hospitals, and financial
service companies. Securing these and other organizations is essential to
keeping our society functioning.
Everyone also benefits
from the work of cyberthreat researchers, like the team of 250 threat
researchers at Talos, who investigate new and emerging threats and cyber attack
strategies. They reveal new vulnerabilities, educate the public on the
importance of cybersecurity, and strengthen open source tools. Their work makes
the Internet safer for everyone.
Types of cybersecurity threats
Phishing
Phishing is the practice of sending
fraudulent emails that resemble emails from reputable sources. The aim is to
steal sensitive data like credit card numbers and login information. It’s the
most common type of cyber attack. You can help protect yourself through
education or a technology solution that filters malicious emails.
Ransomware
Ransomware is a type of malicious
software. It is designed to extort money by blocking access to files or the computer
system until the ransom is paid. Paying the ransom does not guarantee that the
files will be recovered or the system restored.
Malware
Malware is a type of software designed to gain unauthorized
access or to cause damage to a computer.
Social
engineering
Social engineering is a
tactic that adversaries use to trick you into revealing sensitive information.
They can solicit a monetary payment or gain access to your confidential data.
Social engineering can be combined with any of the threats listed above to make
you more likely to click on links, download malware, or trust a malicious
source.
Cisco Security