1 (306) 502-1116

What is cybersecurity and why does it matter?

Tillman Hodgson

Cybersecurity is a word that we hear about in the news, but that doesn’t often inspire deep curiosity and interest; it’s not exactly “light reading.” Cybersecurity refers to the protection of digital assets and data from unauthorized or criminal use. It includes the methods, tools, systems and processes used to help keep your organization’s information […]

Cybersecurity is a word that we hear about in the news, but that doesn’t often inspire deep curiosity and interest; it’s not exactly “light reading.” Cybersecurity refers to the protection of digital assets and data from unauthorized or criminal use. It includes the methods, tools, systems and processes used to help keep your organization’s information safe.

If you have a brick-and-mortar store or office, you likely have an alarm, CCTV cameras or a security system. Your team may have open and close routines and other procedures to keep them and the store safe. Cybersecurity functions in much the same way for your digital storefront and assets.

As more of our daily lives move online, a growing number of Canadian companies are concerned about their cybersecurity needs. Businesses themselves are banking online, placing orders, communicating with customers, and doing bookkeeping online.

In 2017, Statistics Canada found that 20% of small enterprises and 30% of medium enterprises experienced a cyber incident in Canada. Moreover, 80% of enterprises did not have a written policy to manage or report cybersecurity incidents.

A robust cybersecurity plan can help prevent the disruption, downtime, loss of data and other challenges that result from a data breach.

What kind of data needs protecting?

You should protect any corporate electronic data that you wouldn’t want to be leaked. That may be customer info, financial records, intellectual property documents, contracts, communications, hardware, systems and networks.

Of course, cybersecurity needs vary from business to business. At SeekingFire Consulting, we offer a range of services from vulnerability scans (AKA ethical hacking) and assessments to audits and Security Incident Response Plans. We even provide the support of a CISO (Chief Information Security Officer) on a multi-year contract.

Good cybersecurity management isn’t just about responding to an incident or breach. It is also about identifying, testing and mitigating risks in advance to keep the bad guys out.

Thanks to the folks at SecureWorld for highlighting this meme:

Why does it matter?

Hopefully, by this stage of the post, the answer to this question is obvious! We’re talking about protecting your organization’s online data and assets and keeping those items safe from exploitation. It matters because it could be the difference between running a successful business or having a PR nightmare as your clients’ data goes up for sale on the dark web.

With more of us now working from home or accessing work files and emails remotely, the risk and importance of cybersecurity is growing pretty much daily. But, don’t worry, we can help!

At SeekingFire Consulting, we’ve been making the digital world a safer, more secure place since 2005. We’re proud to support businesses and institutions across Western Canada with their data security needs. If you have a cybersecurity question, check out our FAQs or contact us for a no-obligation chat.

Disclaimer

While we have made every effort to present accurate, unbiased and helpful information in this article, please note that it reflects the author’s opinion and is written for the purposes of general knowledge, information and discussion. This article is not intended as legal advice, nor should it be considered as advice specific to your individual data security situation. If you would like to discuss your cybersecurity needs in specific detail, please get in touch with us.

Ready to learn more?

Third Party Security: Who’s Minding Their Store?

Third Party Security: Who’s Minding Their Store?

Giant Tiger made the news this month with a security breach related to a third party. The discount retailer used another company to manage customer engagement and communications. Customer data, including contact information and home addresses were compromised, leaving Giant Tiger with the task of contacting customers to warn them of phishing emails and phone calls likely to ensue as a result.

read more
Stopping the Leaks: How to Play Safe on Today’s Internet

Stopping the Leaks: How to Play Safe on Today’s Internet

Sara finds an email in her inbox, notifying her that she has been the victim of a data leak through one of her social media accounts. Brad gets a similar email, letting him know that his private information is no longer secure after his favourite online store experienced a security breach. These types of notifications are almost commonplace as cybercriminals become increasingly sophisticated in their attacks on the networks that hold our data. In fact, there have been over 26 billion records exposed in what Canadian cybersecurity researchers are terming a “supermassive leak”. 

read more