{"id":22856,"date":"2019-02-13T10:38:44","date_gmt":"2019-02-13T08:38:44","guid":{"rendered":"https:\/\/www.getsmarter.com\/blog\/?p=22856"},"modified":"2025-09-26T08:43:32","modified_gmt":"2025-09-26T06:43:32","slug":"what-is-cybersecurity-and-what-does-it-mean-for-you","status":"publish","type":"post","link":"https:\/\/www.getsmarter.com\/blog\/what-is-cybersecurity-and-what-does-it-mean-for-you\/","title":{"rendered":"What is Cybersecurity and What does it mean for you?"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/01\/artichle-thumbnail-500x278-cyber.png\" alt=\"What is cybersecurity and what does it mean for you Banner\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/01\/Article_Header_970x300px-cyber.png\" alt=\"What is cybersecurity and what does it mean for you Banner\"\/><\/figure>\n\n\n\n<p>With the breadth of news coverage around blockchain, hacking scandals, and data integrity, an average person polled on the street is likely to have at least a basic sense of cybersecurity, as a concept if not by name.<\/p>\n\n\n\n<p>The idea of cybersecurity is omnipresent; we know it exists, and we know it matters. A more concrete definition, however, has proved elusive. Professionals and academics alike have tried to narrow it down, but there remains no definitive, universally-accepted scope of cybersecurity.<\/p>\n\n\n\n<p>With so many definitions available, and none in precise agreement with one another, determining a way forward to cover their organisation against the spectre of cybersecurity can feel like a minefield for key decision-makers.<\/p>\n\n\n\n<p>Understanding the deeper implications of cybersecurity and how to protect users from cybercrime has become unclear. Academic literature mandates that the term \u2018cyber attack\u2019 be used when the effects of the cybercrime are so severe that it requires state intervention due to its widespread, destructive nature.<sup>1<\/sup><\/p>\n\n\n\n<p>Cybercrime may be defined as a \u201cmalicious attack to software, computers and networks\u201d.<sup>2<\/sup> In an attempt to simplify this rather complex issue, think about it in terms of being comparable to how a kidnapping is planned.<\/p>\n\n\n\n<p>In a lecture series held at MIT CSAIL, Harold Moss, a Senior Director of Strategy and Business Development from Akamai, states that hackers are no different to kidnappers \u2013 they watch where people go, identify where they\u2019re going to be vulnerable, and then attack.<sup>3<\/sup><\/p>\n\n\n\n<p>Cybersecurity is therefore not merely a technology risk, but a broader business risk. Protecting the business must be seen not as an issue for the IT department but as a team-wide responsibility concerning all stakeholders.<\/p>\n\n\n\n<p>The cybersecurity and information technology (IT) sectors are currently enjoying rapid growth that\u2019s showing no sign of slowing down. Upskill your career by taking <a href=\"https:\/\/www.getsmarter.com\/subject-matter\/information-technology-and-cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity or IT courses<\/a> online.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-three-sample-definitions-of-cybersecurity\">Three sample definitions of Cybersecurity<\/h2>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-1-cybersecurity-and-information-security\">1. Cybersecurity and Information Security<\/h4>\n\n\n\n<p>This approach debates the relationship between cybersecurity and information security \u2013 and begs the question whether they subsets of one another, or are indeed the same thing.<\/p>\n\n\n\n<p>Broadly defined, information security is classified as the protection of information and information systems from unauthorised access, while cybersecurity is the ability to defend the use of cyberspace from cybercrimes.<sup>5<\/sup><\/p>\n\n\n\n<p>Information security is a concept more broadly understood; it\u2019s been around for decades. The new question is this: whether cybersecurity is an aspect of information security related to private information stored in cyberspace, or whether cybersecurity has subsumed information security altogether.<sup>6<\/sup><\/p>\n\n\n\n<p>A more likely outcome is to consider information security and cybersecurity to be both interdependent and mutually exclusive.<sup>7<\/sup> While they are different disciplines requiring different strategies to maintain security, there is enough overlap that they will always need to be considered in tandem through an integrated approach.<sup>8<\/sup><\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-2-a-human-and-a-computer\">2. A Human and a Computer<\/h4>\n\n\n\n<p>Fredrick Chang, former Director of Research at the US National Security Agency, outlines this definition of cybersecurity and the need for an interdisciplinary solution, \u201cHumans must defend machines that are attacked by other humans using machines. So, in addition to the critical traditional fields of computer science, electrical engineering, and mathematics, perspectives from other fields are needed.\u201d<sup>9<\/sup><\/p>\n\n\n\n<p>The cyber hacker trades in digital heists such as \u201cespionage, disinformation, market manipulation and disruption of infrastructure, on top of previous threats such as data theft, extortion and vandalism\u201d.<sup>10<\/sup> To defeat a human threat, cybersecurity strategies need to be as intelligent, dynamic, and creative as their opponent. This requires holistic solutions across interconnected systems, and drawing on insights from experts across a broad network of disciplines.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-3-cyberspace-confidentiality\">3. Cyberspace Confidentiality<\/h4>\n\n\n\n<p>In a cybersecurity study conducted in 2017 for the Journal of Digital Forensics, Security and Law, researchers reviewed a number of stakeholder issues and came up with this definition of cybersecurity:<sup>11<\/sup><\/p>\n\n\n\n<p>\u201cThe approach and actions associated with security risk management processes followed by organisations and states to protect confidentiality, integrity and availability of data and assets used in cyberspace. The concept includes guidelines, policies and collections of safeguards, technologies, tools and training to provide the best protection for the state of the cyber environment and its users\u201d.<sup>12<\/sup><\/p>\n\n\n\n<p>By this definition, cybersecurity can broadly be considered the sum total of all strategies and systems required to defend the integrity of all confidential information held by a given institution.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-risk-to-businesses\">Risk to businesses<\/h2>\n\n\n\n<p>Due to digitisation, companies need to recognise the three types of interrelated cybersecurity risks that could potentially occur:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Business<\/li>\n\n\n\n<li>Reputation<\/li>\n\n\n\n<li>Litigation<\/li>\n<\/ol>\n\n\n\n<p>Businesses need to approach cybercrime with a broad perspective to ensure the digital safety of their data and systems. In the business sector, there are \u201chundreds of millions of pounds lost to fraud, large commercial transactions derailed, customer-impacting disruptions to business operations, and significant brand value and consumer confidence diluted.&#8221;<sup>13<\/sup><\/p>\n\n\n\n<p>Advances in technology are enabling more sophisticated threats against companies.<sup>14<\/sup> Security for devices connected to the internet requires large-scale reasoning and solutions. This includes cell phones, tablets, technological accessories like headphones and fitness monitors. Cybersecurity needs to encompass all business processes and functions to be effective.<\/p>\n\n\n<div class=\"related-programme-block\">\n<div class=\"related-programme\" onclick=\"window.open('https:\/\/www.getsmarter.com\/courses\/us\/harvard-cybersecurity-online-short-course', '_blank')\">\n    <div class=\"row\">\n        <div class=\"col-12 col-md-11\">\n            <div class=\"related-programme__school-logo-container\">\n            <a href=\"https:\/\/www.getsmarter.com\/universities\/harvard-university\" target=\"_blank\" class=\"related-programme__school-logo-link\">\n                <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/11\/HAR_VPAL_black_variant.png\" alt=\"School Logo\" class=\"related-programme__school-logo\">\n            <\/a>\n            <\/div>\n            <div class=\"related-programme__copy\">\n            <a href=\"https:\/\/www.getsmarter.com\/universities\/harvard-university\" target=\"_blank\" class=\"related-programme__school-name\">\n                HARVARD'S VPAL            <\/a><br>\n            <a href=\"https:\/\/www.getsmarter.com\/courses\/us\/harvard-cybersecurity-online-short-course\" target=\"_blank\" class=\"related-programme__programme-name\">\n                Cybersecurity: Managing Risk in the Information Age online short course            <\/a>\n            <\/div>\n        <\/div>\n        <div class=\"col-md-1 related-programme__chevron-column\">\n            <div class=\"related-programme__icon-container\">\n                <img decoding=\"async\" class=\"add-btn\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/themes\/blog\/assets\/icn_arrow-circle_right.svg\" alt=\"Read More Icon\">\n            <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n<\/div>\n\n\n\n<p>Cybersecurity is rather the prioritisation of high risks to low risks. Low-level risks constitute \u201cacceptable loss\u201d outcomes. The Digital Age presents many positive and negative outcomes for businesses, and this is why risk mitigation has become essential for cyber-resiliency strategies.<sup>15<\/sup><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-mapping-the-way-forward\">Mapping the way forward<\/h2>\n\n\n\n<p>As businesses venture further into the digital world to maintain relevance, they expose themselves to an ever-increasing number of <a href=\"https:\/\/www.getsmarter.com\/blog\/crucial-tips-from-four-cybersecurity-professionals\" target=\"_blank\" rel=\"noreferrer noopener\">cyber threats.<\/a> A holistic plan for cybersecurity management is essential, thus four structural hurdles have been proposed for companies to address cybersecurity holistically:<sup>17<\/sup><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Certain levels of Cybersecurity risk are inevitable<\/li>\n\n\n\n<li>Implications of Cybersecurity are pervasive, spreading into every aspect of the business<\/li>\n\n\n\n<li>Cybersecurity risk is difficult to quantify<\/li>\n\n\n\n<li>It\u2019s difficult to change user behaviour<\/li>\n<\/ol>\n\n\n\n<p>Moving away from viewing cybersecurity as a technology risk and recognising it as a business risk doesn\u2019t have to be an insurmountable task. Cybersecurity is a team sport, not a job description, and a comprehensive cybersecurity strategy will touch every aspect of an organisation, including IT, employee training, and security policies.<sup>18<\/sup><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-changing-user-behaviours\">Changing user behaviours<\/h2>\n\n\n\n<p>Companies must realise that users need to change their behaviours for the security processes to work effectively. Users can unintentionally cause malware attacks by clicking on sabotaged links, or downloading viruses on computers, laptops, or cellphones.<sup>19<\/sup><\/p>\n\n\n<div class=\"related-article-block\">\n\t\t\t\t\t<p class=\"related-article-block__heading\">Related article<\/p><div class=\"blog-item\" onclick=\"location.href='https:\/\/www.getsmarter.com\/blog\/crucial-tips-from-four-cybersecurity-professionals\/'\">\n    <div class=\"bg-img aspect-ratio-16-9\" \n        style=\"        background-image: url('https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/11\/SLOT-12-Q4_Article-header-images_mobile_500x340px.jpg');\n        \">\n    <\/div>\n    <div class=\"blog-item__content\">\n        <p class=\"subject-tags blog-item__tags\">\n            <a href=\"https:\/\/www.getsmarter.com\/blog\/tag\/business-management\/\" class=\"subject-tags__tag-link\">Business &amp; management<\/a> | <a href=\"https:\/\/www.getsmarter.com\/blog\/tag\/systems-technology\/\" class=\"subject-tags__tag-link\">Systems &amp; technology<\/a>        <\/p>\n        <a href=\"https:\/\/www.getsmarter.com\/blog\/crucial-tips-from-four-cybersecurity-professionals\/\" class=\"blog-item__title\">Crucial Tips from Four Cybersecurity Professionals<\/a>\n    <\/div>\n<\/div><\/div>\n\n\n\n<p>For now, there is no concrete solution to this problem. Staff behaviour may be guided by having educational campaigns that show them best practices for online security, but ultimately, companies will incur some risk. It\u2019s inevitable that cyber risks will occur, as even innocuous emails can increase the odds of a security breach. Mitigating against these incidents will decrease the chances of security breaches in a company\u2019s cyberspace. This requires engagement and commitment from all levels of the company, from communication to active participation, in low-risk behaviours online.<sup>20<\/sup><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-a-case-study-in-cybersecurity-agility\">A case study in cybersecurity agility<\/h2>\n\n\n\n<p>Telstra is an industry beacon in cybersecurity innovation. One of Australia\u2019s leading telecommunications and technology companies, Telstra was nominated in 2017 for the Cybersecurity Project of the Year. They developed a cybersecurity guide to success, titled Telstra\u2019s Five Knows of Cyber Security, briefly described below:<sup>22<\/sup><\/p>\n\n\n\n<p><strong>1. Know the value of your data:<\/strong> Understand the true value of your data \u2013 not only for your company, but for those who want to steal it. Recognise how your data could be leveraged for financial or intrinsic gain.<\/p>\n\n\n\n<p><strong>2. Know who has access to your data:<\/strong> Both internally and externally, and who has administrative rights.<\/p>\n\n\n\n<p><strong>3. Know where your data is:<\/strong> Be aware of where are you storing your proprietary data. Whether it\u2019s stored locally, or on the cloud, you need to be aware of how it\u2019s maintained, and whether you can trust service providers to protect your data from third parties. Ensure any third-party providers tasked with storing your data are thoroughly vetted.<\/p>\n\n\n\n<p><strong>4. Know who is protecting your data:<\/strong> You need to have a comprehensive understanding of what processes those tasked with protecting your assets follow, and how easily you can reach them when a breach occurs. Companies are advised to consider hiring a trained, in-house security expert for this purpose.<\/p>\n\n\n\n<p><strong>5. Know how well your data is protected:<\/strong> Be aware of what systems and processes are employed to protect your data, and whether the security measures are adequate and updated regularly to combat new threats.<\/p>\n\n\n\n<p>However you understand cybersecurity today, an awareness of how your system works and where vulnerabilities might occur is an essential step in developing a strategy to protect your organisation against cyberattacks. With the sophistication of cyber threats that exist against businesses today, cybersecurity ought to be a top priority for any organisation or business with sensitive, private, or otherwise classified information.<\/p>\n\n\n\n<div id=\"accordion\">\n<div class=\"card\">\n<div id=\"headingOne\" class=\"card-header\">\n<h6 class=\"mb-0\"><button class=\"btn\" style=\"background-color: transparent;\" data-toggle=\"collapse\" data-target=\"#sources\" aria-expanded=\"true\" aria-controls=\"sources\"> <strong>Click here to view sources<\/strong> <\/button><\/h6>\n<\/div>\n<div id=\"sources\" class=\"collapse\" aria-labelledby=\"headingOne\" data-parent=\"#accordion\">\n<div class=\"card-body\">\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>1<\/sup> Satter, R. (Mar, 2017). \u2018What makes a cyberattack? Experts lobby to restrict them\u2019. Retrieved from\u00a0<a href=\"https:\/\/apnews.com\/2c25d7da76f4409bae7daf063c071420\" target=\"_blank\" rel=\"noopener\">Ap News.<\/a><\/li>\n<li class=\"mb-4\"><sup>2<\/sup> Craigen, D., Daikun-Thibault, N., Purse, R. (Oct, 2014). \u2018Defining Cybersecurity\u2019. Retrieved from <a href=\"https:\/\/timreview.ca\/article\/835\" target=\"_blank\" rel=\"noopener\" data-wplink-edit=\"true\">Technology Innovation Management Review.<\/a><\/li>\n<li class=\"mb-4\"><sup>3<\/sup> Moss, H. (May, 2018). \u2018Cybersecurity &amp; AI: A venture into reality\u2019. Retrieved from <a href=\"https:\/\/www.csail.mit.edu\/event\/cybersecuritycsail-lecture-series-cybersecurity-ai-venture-reality\" target=\"_blank\" rel=\"noopener\">MIT CSAIL.<\/a><\/li>\n<li class=\"mb-4\"><sup>4<\/sup> Campbell, N. (Oct, 2017). \u2018Cybersecurity is a business risk, not just an IT problem\u2019. Retrieved from <a target=\"_blank\" rel=\"noopener\">https:\/\/www.forbes.com\/sites\/edelmantechnology\/2017\/10\/11\/cyber-security-is-a-business-risk-not-just-an-it-problem\/#1db375ce7832<\/a><\/li>\n<li class=\"mb-4\"><sup>5<\/sup> Salvi, V. (Jan, 2015). \u2018The debate on defining cybersecurity\u2019. Retrieved from <a href=\"https:\/\/www.bankinfosecurity.asia\/blogs\/debate-on-defining-cybersecurity-p-1798\" target=\"_blank\" rel=\"noopener\">Bank Info Security.<\/a><\/li>\n<li class=\"mb-4\"><sup>6<\/sup> Chernobai, I. (Apr, 2018). \u2018Cybersecurity vs. Information security\u2019. Retrieved from <a href=\"https:\/\/www.protectimus.com\/blog\/cybersecurity-vs-infosec\/\" target=\"_blank\" rel=\"noopener\">Protectimus.<\/a><\/li>\n<li class=\"mb-4\"><sup>7<\/sup> Chernobai, I. (Apr, 2018). \u2018Cybersecurity vs. Information security\u2019. Retrieved from <a href=\"https:\/\/www.protectimus.com\/blog\/cybersecurity-vs-infosec\/\" target=\"_blank\" rel=\"noopener\">Protectimus.<\/a><\/li>\n<li class=\"mb-4\"><sup>8<\/sup> Chernobai, I. (Apr, 2018). \u2018Cybersecurity vs. Information security\u2019. Retrieved from <a href=\"https:\/\/www.protectimus.com\/blog\/cybersecurity-vs-infosec\/\" target=\"_blank\" rel=\"noopener\">Protectimus.<\/a><\/li>\n<li class=\"mb-4\"><sup>9<\/sup> Craigen, D., Daikun-Thibault, N., Purse, R. (Oct, 2014). \u2018Defining Cybersecurity\u2019. Retrieved from <a href=\"https:\/\/www.protectimus.com\/blog\/cybersecurity-vs-infosec\/\" target=\"_blank\" rel=\"noopener\">Protectimus.<\/a><\/li>\n<li class=\"mb-4\"><sup>10<\/sup> Campbell, N. (Oct, 2017). \u2018Cybersecurity is a business risk, not just an IT problem\u2019. Retrieved from <a href=\"https:\/\/timreview.ca\/article\/835 target=\" rel=\"noopener\">Forbes<\/a><\/li>\n<li class=\"mb-4\"><sup>11<\/sup> Schatz, D., Bashroush, R., Wall, J. (Jun, 2017). \u2018Towards a more representative definition of cybersecurity\u2019. Retrieved from <a href=\"https:\/\/commons.erau.edu\/cgi\/viewcontent.cgi?article=1476&amp;context=jdfsl\" target=\"_blank\" rel=\"noopener\">Journal of Digital Forensics, Security and Law.<br \/><\/a><\/li>\n<li class=\"mb-4\"><sup>12<\/sup> Schatz, D., Bashroush, R., Wall, J. (Jun, 2017). \u2018Towards a more representative definition of cybersecurity\u2019. Retrieved from <a href=\"https:\/\/commons.erau.edu\/cgi\/viewcontent.cgi?article=1476&amp;context=jdfsl\" target=\"_blank\" rel=\"noopener\">Journal of Digital Forensics, Security and Law.<br \/><\/a><\/li>\n<li class=\"mb-4\"><sup>13<\/sup> Mehta, O. (Jan, 2017). \u2018Cybersecurity vs. Cyber security: Don\u2019t leave a gap in your security\u2019. Retrieved from <a href=\"https:\/\/www.linkedin.com\/pulse\/cybersecurity-vs-cyber-security-dont-leave-gap-your-oshin-mehta\/\" target=\"_blank\" rel=\"noopener\">LinkedIn.<\/a><\/li>\n<li class=\"mb-4\"><sup>14<\/sup> Fimin, M. (Nov, 2017). \u2018Five biggest security technology trends for 2018\u2019. Retrieved from <a href=\"https:\/\/www.itproportal.com\/features\/five-biggest-security-technology-trends-for-2018\/\" target=\"_blank\" rel=\"noopener\">IT Proportal.<\/a><\/li>\n<li class=\"mb-4\"><sup>15<\/sup> Parisi, R. (Oct, 2018). \u2018Why cybersecurity insurance is essential to your risk management strategy\u2019. Retrieved from <a href=\"https:\/\/www.securityroundtable.org\/why-you-must-take-cyber-insurance-seriously\/\" target=\"_blank\" rel=\"noopener\">Security Roundtable.<\/a><\/li>\n<li class=\"mb-4\"><sup>16<\/sup> Bradford, L. (Mar, 2018). \u2018What you need to know about cybersecurity in 2018\u2019. Retrieved from <a href=\"https:\/\/www.forbes.com\/sites\/laurencebradford\/2018\/03\/30\/why-people-should-learn-about-cybersecurity-in-2018\/#1cf23bee5d00\" target=\"_blank\" rel=\"noopener\">Forbes.<\/a><\/li>\n<li class=\"mb-4\"><sup>17<\/sup> Bailey, T., Kaplan, J., Rezek, C. (Jun, 2014). \u2018Why senior leaders are the front line against cyber attack\u2019. Retrieved from <a href=\"https:\/\/www.mckinsey.com\/business-functions\/digital-mckinsey\/our-insights\/why-senior-leaders-are-the-front-line-against-cyberattacks\" target=\"_blank\" rel=\"noopener\">Mckinsey &amp; Company.<\/a><\/li>\n<li class=\"mb-4\"><sup>18<\/sup> Schacklett, M. (Apr, 2018). \u201810 ways to develop cybersecurity policies and best practices\u2019. Retrieved from<a href=\"https:\/\/www.zdnet.com\/article\/10-ways-to-develop-cybersecurity-policies-and-best-practices\/\" target=\"_blank\" rel=\"noopener\">ZDnet.<\/a><\/li>\n<li class=\"mb-4\"><sup>19<\/sup> Bradford, L. (Mar, 2018). \u2018What you need to know about cybersecurity in 2018\u2019. Retrieved from <a href=\"https:\/\/www.forbes.com\/sites\/laurencebradford\/2018\/03\/30\/why-people-should-learn-about-cybersecurity-in-2018\/#1cf23bee5d00\" target=\"_blank\" rel=\"noopener\">Forbes.<\/a><\/li>\n<li class=\"mb-4\"><sup>20<\/sup> Chen, B. (Aug, 2018). \u2018Fostering a culture of cybersecurity\u2019. Retrieved from <a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2018\/08\/28\/fostering-a-culture-of-cybersecurity\/#168b43dc183a\" target=\"_blank\" rel=\"noopener\">Forbes.<\/a><\/li>\n<li class=\"mb-4\"><sup>21<\/sup> Telstra Security Operation Team. (2017). Retrieved from <a href=\"https:\/\/cybersecurity-excellence-awards.com\/candidates\/telstra-security-operations-team\" target=\"_blank\" rel=\"noopener\">Cybersecurity Excellence Awards.<br \/><\/a><\/li>\n<li class=\"mb-4\"><sup>22<\/sup> Telstra Security Operation Team. (2017). Retrieved from <a href=\"https:\/\/cybersecurity-excellence-awards.com\/candidates\/telstra-security-operations-team\" target=\"_blank\" rel=\"noopener\">Cybersecurity Excellence Awards.<br \/><\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>With the breadth of news coverage around blockchain, hacking scandals, and data integrity, an average person polled on the street is likely to have at least a basic sense of cybersecurity, as a concept if not by name. The idea of cybersecurity is omnipresent; we know it exists, and we know it matters. A more [&hellip;]<\/p>\n","protected":false},"author":74,"featured_media":22858,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[122,120],"article-format":[],"class_list":["post-22856","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-career-advice","tag-business-management","tag-systems-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is Cybersecurity and What does it mean for you? - GetSmarter Blog<\/title>\n<meta name=\"description\" content=\"What is cybersecurity and what does it mean for you? Learn about the importance of cybersecurity for businesses and private citizens around the world.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.getsmarter.com\/blog\/what-is-cybersecurity-and-what-does-it-mean-for-you\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Cybersecurity and What does it mean for you?\" \/>\n<meta property=\"og:description\" content=\"What is cybersecurity and what does it mean for you? Learn about the importance of cybersecurity for businesses and private citizens around the world.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.getsmarter.com\/blog\/what-is-cybersecurity-and-what-does-it-mean-for-you\/\" \/>\n<meta property=\"og:site_name\" content=\"GetSmarter Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-13T08:38:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-26T06:43:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/01\/artichle-thumbnail-500x278-cyber.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"278\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Shameel Mohanlal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"GetSmarter Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/what-is-cybersecurity-and-what-does-it-mean-for-you\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/what-is-cybersecurity-and-what-does-it-mean-for-you\\\/\"},\"author\":{\"name\":\"Shameel Mohanlal\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/#\\\/schema\\\/person\\\/527df7e5676f2bfa7c943e1653764bff\"},\"headline\":\"What is Cybersecurity and What does it mean for you?\",\"datePublished\":\"2019-02-13T08:38:44+00:00\",\"dateModified\":\"2025-09-26T06:43:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/what-is-cybersecurity-and-what-does-it-mean-for-you\\\/\"},\"wordCount\":1779,\"image\":{\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/what-is-cybersecurity-and-what-does-it-mean-for-you\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/artichle-thumbnail-500x278-cyber.png\",\"keywords\":[\"Business &amp; management\",\"Systems &amp; technology\"],\"articleSection\":[\"Career Advice\"],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/what-is-cybersecurity-and-what-does-it-mean-for-you\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/artichle-thumbnail-500x278-cyber.png\",\"contentUrl\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/artichle-thumbnail-500x278-cyber.png\",\"width\":500,\"height\":278},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/what-is-cybersecurity-and-what-does-it-mean-for-you\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.getsmarter.com\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\"}]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is Cybersecurity and What does it mean for you? - GetSmarter Blog","description":"What is cybersecurity and what does it mean for you? Learn about the importance of cybersecurity for businesses and private citizens around the world.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.getsmarter.com\/blog\/what-is-cybersecurity-and-what-does-it-mean-for-you\/","og_locale":"en_US","og_type":"article","og_title":"What is Cybersecurity and What does it mean for you?","og_description":"What is cybersecurity and what does it mean for you? Learn about the importance of cybersecurity for businesses and private citizens around the world.","og_url":"https:\/\/www.getsmarter.com\/blog\/what-is-cybersecurity-and-what-does-it-mean-for-you\/","og_site_name":"GetSmarter Blog","article_published_time":"2019-02-13T08:38:44+00:00","article_modified_time":"2025-09-26T06:43:32+00:00","og_image":[{"width":500,"height":278,"url":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/01\/artichle-thumbnail-500x278-cyber.png","type":"image\/png"}],"author":"Shameel Mohanlal","twitter_card":"summary_large_image","twitter_misc":{"Written by":"GetSmarter Staff","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.getsmarter.com\/blog\/what-is-cybersecurity-and-what-does-it-mean-for-you\/#article","isPartOf":{"@id":"https:\/\/www.getsmarter.com\/blog\/what-is-cybersecurity-and-what-does-it-mean-for-you\/"},"author":{"name":"Shameel Mohanlal","@id":"https:\/\/www.getsmarter.com\/blog\/#\/schema\/person\/527df7e5676f2bfa7c943e1653764bff"},"headline":"What is Cybersecurity and What does it mean for you?","datePublished":"2019-02-13T08:38:44+00:00","dateModified":"2025-09-26T06:43:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.getsmarter.com\/blog\/what-is-cybersecurity-and-what-does-it-mean-for-you\/"},"wordCount":1779,"image":{"@id":"https:\/\/www.getsmarter.com\/blog\/what-is-cybersecurity-and-what-does-it-mean-for-you\/#primaryimage"},"thumbnailUrl":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/01\/artichle-thumbnail-500x278-cyber.png","keywords":["Business &amp; management","Systems &amp; technology"],"articleSection":["Career Advice"],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.getsmarter.com\/blog\/what-is-cybersecurity-and-what-does-it-mean-for-you\/#primaryimage","url":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/01\/artichle-thumbnail-500x278-cyber.png","contentUrl":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/01\/artichle-thumbnail-500x278-cyber.png","width":500,"height":278},{"@type":"BreadcrumbList","@id":"https:\/\/www.getsmarter.com\/blog\/what-is-cybersecurity-and-what-does-it-mean-for-you\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.getsmarter.com"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.getsmarter.com\/blog"}]}]}},"_links":{"self":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/22856","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/users\/74"}],"replies":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/comments?post=22856"}],"version-history":[{"count":25,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/22856\/revisions"}],"predecessor-version":[{"id":52253,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/22856\/revisions\/52253"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/media\/22858"}],"wp:attachment":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/media?parent=22856"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/categories?post=22856"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/tags?post=22856"},{"taxonomy":"article-format","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/article-format?post=22856"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}