Cyber security
Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.
CHALLENGES OF CYBER SECURITY
For an effective cyber security, an organization needs to coordinate its efforts throughout its entire information system. Elements of cyber encompass all of the following:

Network security
The process of protecting the network from unwanted users, attacks and intrusions.

Application security
Apps require constant updates and testing to ensure these programs are secure from attacks.

Endpoint security
Remote access is a necessary part of business, but can also be a weak point for data. Endpoint security is the process of protecting remote access to a company’s network.

Data security
Inside of networks and applications is data. Protecting company and customer information is a separate layer of security.

Identity management
Essentially, this is a process of understanding the access every individual has in an organization.

Database and infrastructure security
Everything in a network involves databases and physical equipment. Protecting these devices is equally important.

Cloud security
Many files are in digital environments or “the cloud”. Protecting data in a 100% online environment presents a large amount of challenges

Mobile security
Cell phones and tablets involve virtually every type of security challenge in and of themselves.
Cyber safety tips - Protect yourself against cyber attacks
- Update your software and operating system, this means you benefit from the latest security patches.
- Use anti-virus software, Security will detect and removes threats. Keep your software updated for the best level of protection.
- Use strong passwords, Ensure your passwords are not easily guessable.
- Do not open email attachments from unknown senders, these could be infected with malware.
- Do not click on links in emails from unknown senders or unfamiliar websites: This is a common way that malware is spread.
- Avoid using unsecure WiFi networks in public places: Unsecure networks leave you vulnerable to man-in-the-middle attacks.
What is a cyber-attack?
A cyber-attack is a deliberate attempt by external or internal threats or attackers to exploit and compromise the confidentiality, integrity and availability of information systems of a target organization or individual(s). Cyber-attackers use illegal methods, tools and approaches to cause damages and disruptions or gain unauthorized access to computers, devices, networks, applications and databases.
Cyber-attacks come in a wide variety and the following list highlights some of important ones that criminals and attackers use to exploit software:
- Malware
- Ransomware
- Injection attacks (e.g., cross-site scripting, SQL injection, command injection)
- Session management and Man-in-the-Middle attacks
- Phishing
- Denial of service
- Privilege escalations
- Unpatched/Vulnerable software
- Remote code execution
- Brute force

Benifits of cyber security
The benefits of implementing and maintaining cybersecurity practices include:
- Business protection against cyberattacks and data breaches.
- Protection for data and networks.
- Prevention of unauthorized user access.
- Improved recovery time after a breach.
- Protection for end users and endpoint devices.
- Regulatory compliance.
- Business continuity.
- Improved confidence in the company's reputation and trust for developers, partners, customers, stakeholders and employees.