Cybersecurity: a subject that we should all know and practice
- Kreo Estrategias
- Aug 1, 2022
- 2 min read
Collaborators must comply with basic data security principles such as: choosing strong passwords, being careful with email attachments, and constantly creating backup copies.

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. Typically, these cyberattacks:
Access, modify, or destroy confidential information.
Extort users.
Disrupt business continuity.
Currently, digital security measures are implemented because there are more connected devices than people, and attackers are becoming more creative.
What is cybersecurity?
A successful cybersecurity approach has multiple layers of protection spread across the computers, networks, programs, or data one intends to keep safe.
In an enterprise, people, processes, and technology must complement each other to create an effective defense against cyber-attacks.
The collaborators
They should understand and adhere to basic data security principles such as: choosing strong passwords, being cautious with email attachments (especially if they are external to the company), and constantly creating backup copies.
The processes
Companies must have a defined structure to handle suspected and attempted cyber-attacks. A framework can guide you to identify attacks, protect systems, detect and respond to threats, and recover from attacks.
The technology
It is essential to provide computer security tools to protect yourself from cyber-attacks. Three important entities must be protected: endpoint devices (such as computers, smart devices, and routers), networks, and the cloud. Standard technology to protect these entities includes next-generation firewalls, DNS filtering, malware protection, antivirus software, and email security solutions.
Why is cybersecurity critical?
In today's connected world, cybersecurity helps us prevent identity theft, extortion attempts, and even the loss of valuable data.
There are several types of cybersecurity threats, and we are going to explain them.
Phishing
It is the practice of sending fraudulent emails that resemble authentic sources. The goal is to steal sensitive data such as credit/debit card numbers and login information. You can protect yourself through education and a technology solution that filters out malicious emails.
Ransomware
It is a type of malicious software. It is designed to demand money by blocking access to files or computer systems until a ransom is paid. Unfortunately, paying the ransom does not guarantee that your files will be recovered or that your system will be restored.
Malware
It is software designed to gain unauthorized access to or cause damage to a computer.
Social engineering
It's a tactic adversary use to trick you into revealing sensitive information. For example, they may request a monetary payment or gain access to your sensitive data. Any of the threats above can combine social engineering to predispose you to click a link, download malware, or trust a malicious source.
Understanding these cybersecurity threats will help us prevent them at a personal and work level.
Contact: Mario Barboza | mbarboza@grupocomeca.com





Comments