Cheat sheets

Cyber security

Cyber security is about preventing or limiting the consequences of attacks.

You can see cyber security as a complex structure that rests on three pillars: technology, people and organization. Each pillar should receive adequate attention to ensure that cyber security as a whole remains solid.

Cyber security increasingly demands your attention. As criminals increasingly use the Internet to influence public opinion, disrupt information flows, steal information or make money through extortion.

Governments, companies and individuals will have to arm themselves against cybercrime. Cyber security is concerned with this. If you know the weak spots in your IT infrastructure, you can tackle it in time and limit or prevent damage.

Cyber security

Your organization is increasingly connected to the internet. Not only are all your computers and laptops linked to it, so are your Voip telephone exchange and employees’ mobile phones and tablets. Perhaps you use the cloud for ERP software, CRM software or data storage, or you have devices that are connected via the internet, the so-called internet of things.

The Internet is indispensable for all these applications. Your business depends on it, which makes you vulnerable. If criminals can access your files or equipment via the internet, the damage can be significant. Cyber ​​security is aimed at protecting your data, company network and other ICT solutions against attacks.

This protection concerns the combination of technical and organizational measures and contributes to the necessary discipline and alertness of employees who use the ICT solutions.

If they are aware of the dangers of the internet and the associated software and hardware and if they consciously avoid risks, the chance of damage decreases.

It goes without saying that it is good to provide your company with good locks, so it is logical and perhaps even more important to protect your organization against the dangers of cybercrime. Cyber ​​security is therefore necessary and requires your continuous attention.

Cyber attacks

The number of technical options for carrying out cyber attacks is increasing. In addition, cybercrime methods are becoming more sophisticated and cybercriminals seem to have an increasing level of knowledge. This creates new challenges every time to protect you against new forms of phishing, hacking, ransomware, DDos attacks or theft of identity or information. You can protect yourself against malware and viruses if you continue to provide your computers, networks and other ICT infrastructure with up-to-date anti-spam filters and virus scanners. But more is needed for complete protection.

The consequences of cyber attacks on companies, governments and society in general are increasing. In many cases this is about financial gain. Larger companies in particular are victims of cybercrime for that purpose. Disruption, influence or sabotage are other goals of cyber attacks. Geopolitical reasons usually underlie this.

Internet of things

The internet of things poses a great danger, the basic assumption being that more and more devices for mutual communication are connected via the internet. What is still successful with computers in a network is difficult to achieve with many other devices, such as taking security measures, performing security updates or applying encryption. In recent times, these insufficiently secured devices have been regularly involved in cyber security breaches.

Differences between cyber security and information security

Information security is about the measures and procedures to guarantee availability, exclusivity and integrity of information provision and to limit the consequences of information theft or other incidents to an acceptable level. Cyber security is only that part of the information security that revolves around the protection against attacks via the internet. For example, the term cyber security is also used to protect cyberspace and for ICT incidents (disruption, failure or abuse).