
The very word cybersecurity can sound intimidating. It means different things to different people. Indeed, it is a popular word that represents an in-demand skill set, online attacks, internet crime prevention and many more. But what does it really mean? what is its true purpose? why has is it become a buzz word and what does it do for the average user of computing devices? Let’s find out!
What is cybersecurity?
The word cybersecurity is a combination of two words, cyber and security. According to the Merriam-Webster dictionary, the word cyber means “relating to or involving computers, and computer networks such as the internet”. It originated from the Greek word “kybernetes” which means governor, regulator or controller. The word security on the other hand means to offer protection for an asset. Accordingly, the term cybersecurity refers to the ability to offer protections for computer and digital assets such as networks, devices and information systems.
Why should the average user know about it?
In essence, computing devices and networks are not fault or failure proof. They have inherent and superficial weaknesses in them. Consequently, these weaknesses have become a lucrative source of attraction for bad actors who seek to gain financial, personal, social and national gain from exploiting them. This is known as a cyber-attack.
Presently, we live in a digital world. Huge amounts of data and information are created, processed and stored daily. Information is now the new currency. Think of the number of emails, text messages, social medial content, personal and official documents you send and receive daily. Some of which may contain sensitive and private information. The sheer volume and value of information generated by millions of people around the world makes computer systems and networks a prime target for bad actors.
Furthermore, humans represent another form of weakness to computer systems. Bad actors take advantage of user habits and traits such as empathy, kindness, trust, forgetfulness, and carelessness to cause harm to the information systems. Almost every computer and digital system relies on human operation. Hence, users are vital to ensuring its safeguard and successful use.
What should the average user bear in mind?
Now, whether you use a computing device for work, personal dealings, or both, you are at risk of a cyberattack. The devices and applications we use collects lots of information about us. This includes the websites we visit, our location, the amount of time we spend on our favorite apps, etc. This sensitive and private information is shared with other applications and devices we connect with.
While this might lead to the convenience of generating real time traffic information and targeted advertising, bad actors can also collect this confidential information. The first step in crafting successful cyberattacks is to create personal profiles about individuals. From there, they can modify the stolen information to launch various forms of cybercrime. Additionally, it is important to note that computing systems must be available to use when required. Downtime due to faulty systems, a lack of redundancy and nonexistent backups, creates an insecure digital environment.
Having said this, it is essential to know that you, the user, is a crucial part of the solution. Notice the alphabet ‘u” is at the center of the word “security”. Even though users present significant weaknesses to computing systems, trained users are the frontline defensive makeup of many cybersecurity efforts. In fact, a combination of trained users and cybersecurity technologies offer a more effective defensive solution.
Additionally, users have a greater responsibility to protect themselves on personal computing devices. When engaged in activities such as browsing the web, downloading apps or accessing financial information, this is especially true. Consequently, every user needs to have adequate knowledge, skill and awareness to defend themselves from bad actors who seek to harm them.
The Takeaway
Every day, we see and experience various cybersecurity concepts. You do not need to know the sophisticated details. Just be aware there are weaknesses in computing systems and networks which can be taken advantage of by people with wicked intentions. Computer networks store, process and transmit highly valuable information and people seek to exploit this because it offers good profit.
Ultimately, As a user of computing devices, you play a vital role in securing digital assets. Be conscious of the fact that cyber threats exist. Ditch habits and behaviors that increases the risk of becoming a victim of cybercrime. Follow these excellent tips for good cyber hygiene to stay cyber safe. As always, be healthy, be safe and be cyber secure.