Skip to main content

Hello there 🙂 Its been over a year? Sheeeeesh, been a bit caught up with life lifing – where are the millenials at? haha

lets dive in…

I could start by defining this but on second thought, nah! Here is what you need to know in summary, you receive a wierd email saying “your email will be deactivated if you do not resolve the issue in 24hrs” and a blue button is provided (no idea why they choose blue btw?) HOLD UP before you click on the button, lets take a minute. Yes I understand you want to take action immediately, afterall emails are your life now…haha!

Lets go through the email once more and dissect it. Check the following:
1. Who sent it?
2. Subject
3. Body of the message

Alright, many are the times Subject and Body makes sense but lets check “who sent it?”

The email looks very fishy. Busted!

You almost lost access to your emails or worse, someone would have accessed your computer. Next thing you know, your company trade secrets are out there, jobless, its raining and you are asking yourself, “did i clear my history?”

Cybersecurity refers to the practice of protecting computer systems, networks, data, and devices from unauthorized access, cyberattacks, theft, damage, or disruption.

Key Components of Cybersecurity:
1. Risk Management: involves identifying, prioritizing, and mitigating these risks through various security measures.

2. Data Protection: Data is a valuable asset that requires protection from unauthorized access, theft, or alteration.

3. Identity and Access Management (IAM): manage user identities, authentication, and access permissions to ensure that only authorized individuals can access specific resources and data.

4. Network Security: focuses on protecting the integrity and confidentiality of data as it travels across networks.

5. Endpoint Security: Endpoint devices, such as computers, smartphones, and tablets, are common targets for cyberattacks. Protect these devices from malware, ransomware, and other threats.

6. Application Security: Applications and software systems often contain vulnerabilities that can be exploited by attackers to gain unauthorized access or disrupt services

7. Security Awareness and Training: People are often the weakest link in cybersecurity.

8. Incident Response and Management: Incident response plans outline procedures for detecting, responding to, and recovering from security breaches or cyberattacks in a timely and effective manner.

9. Security Governance and Compliance: Security governance frameworks, policies, and compliance standards provide guidelines and requirements for implementing and maintaining effective cybersecurity practices.

Importance of Cybersecurity:
– Protection of Confidential Information
– Preservation of Trust and Reputation
– Business Continuity
– Prevention of Financial Loss
– Protection of National Security

Now that you have a better understanding, I want to insist on “people are often the weakest link”. Before you click on any random buttons or download something you are not sure about, consult your Tech person. Yes most times it looks urgent and its designed to throw you off for you to take action.My advice is relax its not burning!

“It takes 20 years to build a reputation and a few minutes of cyber-incident to ruin it”

Thank me later… cheers!

Ndengera

Author Ndengera

More posts by Ndengera

Leave a Reply

All rights reserved COAD Technologies.