Cyber

Cybersecurity: Unmissable Information the Non-Security Professional should know

The very word cybersecurity can sound intimidating. It means different things to different people. Indeed, it is a popular word that represents an in-demand skill set, online attacks, internet crime prevention and many more. But what does it really mean? what is its true purpose? why has is it become a buzz word and what does it do for the average user of computing devices? Let’s find out!

What is cybersecurity?

The word cybersecurity is a combination of two words, cyber and security. According to the Merriam-Webster dictionary, the word cyber means “relating to or involving computers, and computer networks such as the internet”. It originated from the Greek word “kybernetes” which means governor, regulator or controller. The word security on the other hand means to offer protection for an asset. Accordingly, the term cybersecurity refers to the ability to offer protections for computer and digital assets such as networks, devices and information systems.

Why should the average user know about it?

In essence, computing devices and networks are not fault or failure proof. They have inherent and superficial weaknesses in them. Consequently, these weaknesses have become a lucrative source of attraction for bad actors who seek to gain financial, personal, social and national gain from exploiting them. This is known as a cyber-attack.

Presently, we live in a digital world. Huge amounts of data and information are created, processed and stored daily. Information is now the new currency. Think of the number of emails, text messages, social medial content, personal and official documents you send and receive daily. Some of which may contain sensitive and private information. The sheer volume and value of information generated by millions of people around the world makes computer systems and networks a prime target for bad actors.

Furthermore, humans represent another form of weakness to computer systems. Bad actors take advantage of user habits and traits such as empathy, kindness, trust, forgetfulness, and carelessness to cause harm to the information systems.  Almost every computer and digital system relies on human operation. Hence, users are vital to ensuring its safeguard and successful use.

What should the average user bear in mind?

Now, whether you use a computing device for work, personal dealings, or both, you are at risk of a cyberattack. The devices and applications we use collects lots of information about us. This includes the websites we visit, our location, the amount of time we spend on our favorite apps, etc. This sensitive and private information is shared with other applications and devices we connect with.

While this might lead to the convenience of generating real time traffic information and targeted advertising, bad actors can also collect this confidential information. The first step in crafting successful cyberattacks is to create personal profiles about individuals. From there, they can modify the stolen information to launch various forms of cybercrime. Additionally, it is important to note that computing systems must be available to use when required. Downtime due to faulty systems, a lack of redundancy and nonexistent backups, creates an insecure digital environment.

Having said this, it is essential to know that you, the user, is a crucial part of the solution. Notice the alphabet ‘u” is at the center of the word “security”. Even though users present significant weaknesses to computing systems, trained users are the frontline defensive makeup of many cybersecurity efforts. In fact, a combination of trained users and cybersecurity technologies offer a more effective defensive solution.

Additionally, users have a greater responsibility to protect themselves on personal computing devices. When engaged in activities such as browsing the web, downloading apps or accessing financial information, this is especially true. Consequently, every user needs to have adequate knowledge, skill and awareness to defend themselves from bad actors who seek to harm them.

The Takeaway

Every day, we see and experience various cybersecurity concepts.  You do not need to know the sophisticated details. Just be aware there are weaknesses in computing systems and networks which can be taken advantage of by people with wicked intentions. Computer networks store, process and transmit highly valuable information and people seek to exploit this because it offers good profit.

Ultimately, As a user of computing devices, you play a vital role in securing digital assets. Be conscious of the fact that cyber threats exist. Ditch habits and behaviors that increases the risk of becoming a victim of cybercrime. Follow these excellent tips for good cyber hygiene to stay cyber safe.  As always, be healthy, be safe and be cyber secure.

12 thoughts on “Cybersecurity: Unmissable Information the Non-Security Professional should know”

  1. Sammy says:

    Great article
    this makes the field enticing and eye catching. A great overview of the field we yern to be experts in.

  2. AC says:

    Very informative, thanks for sharing, I am learning a lot from your articles.

    1. Kofi Quist says:

      Thanks! I’m glad you find it useful.

  3. Promise Yawson says:

    Great . Thank you for sharing.

    1. Kofi Quist says:

      I’m glad you found it useful!

  4. George says:

    Great peace of information to remind those of us in the field to also share to users we work with who are not tech savvy. Good job

  5. Edward Harris says:

    A continuation of the conversation is surely needed. Although this article is very informative. Thank you for writing this. Cheers,

    1. Kofi Quist says:

      Thanks for showing interest Edward. We will definitely continue the conversation.

  6. Paul Modey says:

    I think this article gives an overview and eye-opening points about cybersecurity to people who are not even IT inclined. Great piece.

    1. Kofi Quist says:

      Great observation! Thanks Paul.

Leave a Reply

Your email address will not be published. Required fields are marked *