Skip to content

What is cyber security?

When we talk about cyber security, the image that often springs to mind is that of a hooded youth sitting in darkness, lit only partially by the light from their computer screen. In reality, though, cyber criminals and hackers come in all shapes and sizes and from all walks of life.

Reports of new cyber-attacks are in the headlines every day, while more powerful technologies make it easier for hackers to gain access to your valuable information.

The definition of cyber security is that an entity is being protected against their data being accessed and used without consent. The way in which data is secured is through the use of technology, processes and practices that prevent a cyber attack.

These online security processes can be used to protect systems that we often take for granted. These can include anything from traffic signals to in-car technology, banks accounts to life support machines.

Cyber crime can disrupt systems that can lead to loss of life, as well as loss of money.




climbing

Embed, expand and scale your compliance, without the mess. IO gives you the resilience and confidence to grow securely.




What can we do to improve our cyber and computer security?

Installing firewalls and anti-virus software might seem obvious, but a report from tech giant Microsoft found 24% of the world’s PCs in were not protected. It’s also a good idea to ensure that your operating system is updating itself with the latest patches automatically. At work, staff should only have access to the systems that they need to do the job. For example, not all staff will need to have administrative access to a website.

Encrypting any personally identifiable information is something that has come up in the General Data Protection Regulation (GDPR). If the information is stolen that can be used to identify an individual, you would be liable for that breach.

The importance of training staff in cyber security

Staff can be your biggest asset in the fight against cyber crime, but they can also be the cause of cyber insecurities. They need to understand what is expected of them when it comes to security. Should they lock their computer screen when leaving heir desk? Is there a shredder available if you print sensitive documents? Do you have a password policy? All of this should be considered when you train our staff.

The Information Commissioner‘s Office (ICO) has put together a set of cyber security training materials that include toolkits and videos to help organisations train their staff.


Mike Jennings

Mike is the Integrated Management System (IMS) Manager here at ISMS.online. In addition to his day-to-day responsibilities of ensuring that the IMS security incident management, threat intelligence, corrective actions, risk assessments and audits are managed effectively and kept up to date, Mike is a certified lead auditor for ISO 27001 and continues to enhance his other skills in information security and privacy management standards and frameworks including Cyber Essentials, ISO 27001 and many more.

Take a virtual tour

Start your free 2-minute interactive demo now and see
ISMS.online in action!

platform dashboard full on crystal

We’re a Leader in our Field

4/5 Stars
Users Love Us
Leader - Fall 2025
High Performer, Small Business - Fall 2025 UK
Regional Leader - Fall 2025 Europe
Regional Leader - Fall 2025 EMEA
Regional Leader - Fall 2025 UK
High Performer - Fall 2025 Europe Mid-market

"ISMS.Online, Outstanding tool for Regulatory Compliance"

— Jim M.

"Makes external audits a breeze and links all aspects of your ISMS together seamlessly"

— Karen C.

"Innovative solution to managing ISO and other accreditations"

— Ben H.