
Cyber Security
What does “Cyber” mean?
The word cyber was coined in the latter half of the 20th century in connection with the development of computers and the internet. It comes from the concept of cybernetics (cybernetics) which is about control and communication theories as well as control and regulation techniques with regular feedback. The word cyber is seldom used alone, but almost always in combinations such as the word cyberspace, which can be equated with the internet and its connections with different computer systems.
Information Security, IT Security & Cyber Security
These three terms are often used synonymously, but each has a specific definition:
Information security is about security for information that can be both physical and digital (handwritten papers or information in computer systems).
IT security is about security for information in computer systems and their interconnections.
Cyber security can to a large extent be compared to IT security, but takes a broader approach to the outside world, human factors and work management.
Cyber security consists of various risk management methods, technical tools, knowledge and methods for protecting networks, digital devices, programs and data from cyber threats. Sweden's national strategy for information and cyber security defines cyber security as the security of digital information.
Cyber Threats
Information can be very valuable to the person who owns it and may base their entire business on the information being confidential, accurate and available within the organization. The threat to computer information comes from those who try to access sensitive information for the benefit of their own purposes. It can be about stealing information, destroying or changing the information in the computers so that it becomes unusable, or preventing authorized access to it.
Such cyber threats pose major problems in today's computerized society, and affect organizations of all sizes, public as well as private.
Where do cyber threats come from?
Cyberattacks can come from individuals or groups for financial gain. They can also come from other states such as sabotage (cyber warfare) or information gathering. Terrorist organizations can carry out cyberterrorism by undermining computer systems to cause fear and panic.
The consequences of cyber attacks
Cyberattacks can lead to major disruptions in an organization's work. Information can be lost or destroyed. This can lead to production disruption for a longer or shorter period of time. The disruption can lead to large costs in the form of production losses and subsequent problem solving for the restoration of security measures. The trust and reputation of the organization can also be severely damaged and difficult to restore.
Competence and regular checks
In order to be able to conduct effective cyber security work, competent cyber security experts are required. These are available from information security companies and security consultants. It is also important that an organization has competence among its own staff. Such expertise can be recruited to monitor and update security measures and ensure that the organization's security keeps pace with, or preferably is one step ahead of, the increasingly advanced threats.
The whole organization must be involved
It is important that the management and all relevant personnel within the organization are trained in cyber security. The effect of an organization's security work is largely determined by the management's attitude. Everyone needs to take responsibility, but it is crucial that the management takes responsibility for, supports and follows up the safety work. And it is important that this permeates all levels within the organization.
Do you need help with you cyber security? Contact Us!