Cybersecurity is the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information. It seems that everything relies on computers and the internet now—communication (e.g., email, smartphones, tablets), entertainment (e.g., interactive video games, social media, apps ), transportation (e.g., navigation systems), shopping (e.g., online shopping, credit cards), medicine (e.g., medical equipment, medical records), and the list goes on. How much of your daily life relies on technology? How much of your personal information is stored either on your own computer, smartphone, tablet or on someone else's system?
There are many risks, some more serious than others. Among these dangers are malware erasing your entire system, an attacker breaking into your system and altering files, an attacker using your computer to attack others, or an attacker stealing your credit card information and making unauthorized purchases. There is no guarantee that even with the best precautions some of these things won't happen to you, but there are steps you can take to minimize the chances.
The first step in protecting yourself is to recognize the risks. Familiarize yourself with the following terms to better understand the risks:
To minimize the risks of cyberattacks, follow basic cybersecurity best practices:
Cybersecurity | CISA - CISA leads the Nation’s strategic and unified work to strengthen the security, resilience, and workforce of the cyber ecosystem to protect critical services and American way of life.
NIST Cybersecurity & Privacy Program - The Vitals- NIST develops cybersecurity standards, guidelines, best practices, and other resources to meet the needs of U.S. industry, federal agencies and the broader public. Our activities range from producing specific information that organizations can put into practice immediately to longer-term research that anticipates advances in technologies and future challenges.
Cyber espionage is the use of computer networks to gain illicit access to confidential information, typically that held by a government or other organization.
The latest timeline of cyber incidents in 2022. Significant Cyber Incidents | Center for Strategic and International Studies (csis.org)
Global cybercrime predictions for 2022:
Technology cybercrime predictions for 2022