2. Why is cyber security important?
3. Cybersecurity - defence in all areas of life
4. What aspects does cybersecurity cover?
5. What are the biggest cybersecurity vulnerabilities?
6. Effective cybersecurity management against cybercrime
Written by Thomas Philipp Haas

2. Why is cyber security important?
3. Cybersecurity - defence in all areas of life
4. What aspects does cybersecurity cover?
5. What are the biggest cybersecurity vulnerabilities?
6. Effective cybersecurity management against cybercrime
What is cybersecurity? The term cybersecurity covers various protective measures that protect systems linked to the Internet from cyber attacks. These include individual computers, mobile devices, server networks, hardware, software, data, networks, data centers and infrastructures. The term covers private, professional and public areas of life.
Cybersecurity is often equated with the terminology IT security or information security. Although there are overlaps, the following differentiation and delimitation is nevertheless important:
Cybersecurity focuses not only on individual computers or networks and their environment, but on the big picture. This includes all digital forms of communication, workflows or applications.
In Germany, more and more companies, organizations and authorities are recognizing the risks and real consequences of cybercrime. For this reason, the Alliance for Cyber Security provides a forum in which 4,942 participants (as of April 2021) have so far discussed risks and possible solutions. They also provide each other with assistance and exchange experiences. Basically, any institution or company within Germany can participate. The advantage is that members improve and expand their skills, expertise and knowledge regarding cybersecurity.
Cybersecurity standards help provide guidance in this confusing online world. These are a set of published measures and best practices. These rules and regulations strengthen the cyber resilience of companies and organisations.
The following publications contain tools, guidelines, concepts, preparations, risk management approaches, training and technologies:
Cyberattacks or cyberthreats are, for the most part, relatively fleeting concepts. However, cyberattacks on companies, organisations or even states can take a wide variety of concrete forms. The following examples are among the best known and most common.
Cybersecurity should permeate every area of life. Private as well as professional and public life is interconnected with the internet. There is also no sharp dividing line between these areas. One merges into the other and everything is equally risky.
These are areas that rely on modern technology and are now more or less digitalised. Accordingly, they are vulnerable to cybercrime.
Cyber attacks on critical infrastructures do not always happen out of greed. Often they even have political or terrorist backgrounds. In hardly any other area, however, can attacks specifically endanger human lives through supply shortages in a comparable way.
During a cybersecurity check, some specific vulnerabilities can usually be found and fixed to build a more successful cybersecurity resilience.
However, it is worth taking a self-critical look at some common and popular vulnerabilities that crop up all the time.
Humans often represent the biggest security gap. After all, technology only works as well as the people who develop and operate it. These vulnerabilities can be intentional or accidental misconduct.
People working within a network can intentionally spy on data or simply be careless. Clicking on the wrong link, opening the wrong website or ignoring an important software update is enough. Cybercriminals are quick to exploit carelessness to gain access to important data.
Passwords that are too easy to guess are more common than they should be. This often happens out of convenience, although private individuals and companies are aware of the risks. Often it is a standard term or a short combination of numbers, even birthdays are used.
Wireless networks can often have outdated WEP encryption protocols, making them easy targets for attack. A new upgrade to WPA2 or WPA3 is urgently needed in this case. However, the former is also risky. However, many attacks on WLAN networks at home or in the office are successful because users use the preset service set identifiers (SSID) and default passwords instead of changing them.
Public WLAN networks in particular offer little security, even though users need a password to log in. Users' online activities are not encrypted unless they use a Virtual Private Network. WiFi hotspots can easily be faked so that users log in to them. Unauthorised third parties can easily intercept sensitive data in this way.
Cybersecurity faces constant challenges from ever-evolving technology and therefore new risks. That's why there is no single solution that will stop all current and future cyberattacks (learn which security platform is best for you in this free whitepaper). This is not to say that businesses, organisations or individuals should forgo cybersecurity and hope for the best. There are a number of strategies and tools available to protect against cyberattacks. These need to be applied at multiple levels and in multiple forms to map an optimal cybersecurity concept. It is helpful to design networks in such a way that not every employee has access to all areas. Rather, control mechanisms should be implemented so that each employee has access to the network areas that are absolutely necessary for his or her task.
Cybersecurity starts with each individual end user. They can defend themselves against attacks with various measures and tools. Encrypting emails protects important data during transmission and makes it unreadable for unauthorised third parties. Current virus scanners and other security programmes examine computers to detect and remove malware. To do this, of course, this software must always be kept up to date. Strong, hard-to-guess passwords can be created with password management tools or random generators. Users should never open e-mail attachments from unknown, suspicious senders. To the same extent, they should avoid suspicious-looking and unknown websites and downloads as well as public unprotected hotspots.