{"id":21615,"date":"2020-03-16T06:55:51","date_gmt":"2020-03-16T06:55:51","guid":{"rendered":"https:\/\/itt.com.au\/?p=21615"},"modified":"2020-03-16T06:55:51","modified_gmt":"2020-03-16T06:55:51","slug":"what-is-cyber-security","status":"publish","type":"post","link":"https:\/\/itt.com.au\/what-is-cyber-security\/","title":{"rendered":"What is cyber security?"},"content":{"rendered":"\n

Cyber security refers to the systems which protect and safeguard your organisation\u2019s data from attacks and threats. An attack on your data can cause immeasurable damage through loss of data and disruptions to operations. It is estimated that by 2021, cybercrime will cost $6 trillion worldwide.<\/p>\n\n\n\n

Every organisation has vulnerabilities in their systems which can be exploited by attackers. Having strong cyber security procedures in place will protect your data from attacks such as computer viruses, data breaches, phishing, and Denial of Service (DoS) attacks.<\/p>\n\n\n\n

So, how can your organisation mitigate cyber security risks?<\/h4>\n\n\n\n
  1. Secure third party cloud applications through adding two way authentication via SMS or a mobile app such as Google, Microsoft authenticator or Authy<\/li><\/ol>\n\n\n\n
    1. Improve the strength of passwords. It’s good practice to use passwords over 12 letters long with upper and lower case letters, numbers, and special characters such as \u201cIwastheBestin1971!\u201d. When passwords meet these guidelines it would take a hacker over a million years to hack them<\/li><\/ol>\n\n\n\n
      1. Establish a cyber security policy in your organisation which guides best practice, such as ensuring that passwords aren\u2019t shared<\/li><\/ol>\n\n\n\n
        1. Update passwords every 90 days<\/li><\/ol>\n\n\n\n
          1. Train employees on how to identify online scams, phishing attempts and other cyber attacks<\/li><\/ol>\n\n\n\n
            1. Ensure operating systems are up to date on the organisation\u2019s devices and the employees\u2019 devices if your organisation permits BYOD (Bring your own device)<\/li><\/ol>\n\n\n\n
              1. Install antivirus software on the organisation\u2019s devices and the employees\u2019 devices (for BYOD) and ensure the subscription is valid and working<\/li><\/ol>\n\n\n\n
                1. Ignore or delete suspicious emails or hang up suspicious calls. Never give remote access to your devices<\/li><\/ol>\n\n\n\n
                  1. Limit what you share on social media to protect against identity theft or spear phishing<\/li><\/ol>\n\n\n\n
                    1. Report potential cyber crime activity. If you believe you have been the victim of a cyber security attack or believe an attempt was made against you, report it to the Cyber Security Centre<\/a><\/li><\/ol>\n\n\n\n

                      By entrusting your cyber security needs to a trusted IT provider<\/a>, you gain peace of mind that your data and business is protected.<\/p>\n \t \t","protected":false},"excerpt":{"rendered":"

                      <\/p>\n","protected":false},"author":1,"featured_media":39510,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[7],"tags":[4],"yoast_head":"\nWhat is cyber security? - IT&T | Business IT Services and Solutions<\/title>\n<meta name=\"description\" content=\"Having strong cyber security procedures in place will protect your data from attacks such as computer viruses, data breaches, phishing, and Denial of Service attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itt.com.au\/what-is-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is cyber security?\" \/>\n<meta property=\"og:description\" content=\"Having strong cyber security procedures in place will protect your data from attacks such as computer viruses, data breaches, phishing, and Denial of Service attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itt.com.au\/what-is-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"IT&T | Business IT Services and Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/ITT-Pty-Ltd\/268794825213\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-16T06:55:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itt.com.au\/wp-content\/uploads\/2020\/03\/Cyber-Security-1300w-min.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1301\" \/>\n\t<meta property=\"og:image:height\" content=\"728\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"itt-admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ITT2500\" \/>\n<meta name=\"twitter:site\" content=\"@ITT2500\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"itt-admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itt.com.au\/what-is-cyber-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itt.com.au\/what-is-cyber-security\/\"},\"author\":{\"name\":\"itt-admin\",\"@id\":\"https:\/\/itt.com.au\/#\/schema\/person\/7c217fee9a41c7ae0fbbac51d10cdab1\"},\"headline\":\"What is cyber security?\",\"datePublished\":\"2020-03-16T06:55:51+00:00\",\"dateModified\":\"2020-03-16T06:55:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itt.com.au\/what-is-cyber-security\/\"},\"wordCount\":338,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itt.com.au\/#organization\"},\"image\":{\"@id\":\"https:\/\/itt.com.au\/what-is-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itt.com.au\/wp-content\/uploads\/2020\/03\/Cyber-Security-1300w-min.jpg\",\"keywords\":[\"Blog\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itt.com.au\/what-is-cyber-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itt.com.au\/what-is-cyber-security\/\",\"url\":\"https:\/\/itt.com.au\/what-is-cyber-security\/\",\"name\":\"What is cyber security? - IT&T | Business IT Services and Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/itt.com.au\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itt.com.au\/what-is-cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itt.com.au\/what-is-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itt.com.au\/wp-content\/uploads\/2020\/03\/Cyber-Security-1300w-min.jpg\",\"datePublished\":\"2020-03-16T06:55:51+00:00\",\"dateModified\":\"2020-03-16T06:55:51+00:00\",\"description\":\"Having strong cyber security procedures in place will protect your data from attacks such as computer viruses, data breaches, phishing, and Denial of Service attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/itt.com.au\/what-is-cyber-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itt.com.au\/what-is-cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itt.com.au\/what-is-cyber-security\/#primaryimage\",\"url\":\"https:\/\/itt.com.au\/wp-content\/uploads\/2020\/03\/Cyber-Security-1300w-min.jpg\",\"contentUrl\":\"https:\/\/itt.com.au\/wp-content\/uploads\/2020\/03\/Cyber-Security-1300w-min.jpg\",\"width\":1301,\"height\":728},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itt.com.au\/what-is-cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itt.com.au\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is cyber security?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itt.com.au\/#website\",\"url\":\"https:\/\/itt.com.au\/\",\"name\":\"IT&T | Business IT Services and Solutions\",\"description\":\"The better solution\",\"publisher\":{\"@id\":\"https:\/\/itt.com.au\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itt.com.au\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itt.com.au\/#organization\",\"name\":\"IT&T | Business IT Services and Solutions\",\"url\":\"https:\/\/itt.com.au\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itt.com.au\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itt.com.au\/wp-content\/uploads\/2023\/05\/Logo-itt.svg\",\"contentUrl\":\"https:\/\/itt.com.au\/wp-content\/uploads\/2023\/05\/Logo-itt.svg\",\"width\":1,\"height\":1,\"caption\":\"IT&T | Business IT Services and Solutions\"},\"image\":{\"@id\":\"https:\/\/itt.com.au\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/pages\/ITT-Pty-Ltd\/268794825213\",\"https:\/\/x.com\/ITT2500\",\"https:\/\/www.youtube.com\/channel\/UCdEqeP6rJVRssjnv1HWig2Q\",\"https:\/\/www.instagram.com\/itt_wollongong\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itt.com.au\/#\/schema\/person\/7c217fee9a41c7ae0fbbac51d10cdab1\",\"name\":\"itt-admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itt.com.au\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0e210a3f1f5cf1082adab126cc1a9e4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0e210a3f1f5cf1082adab126cc1a9e4a?s=96&d=mm&r=g\",\"caption\":\"itt-admin\"},\"sameAs\":[\"https:\/\/itt.com.au\"],\"url\":\"https:\/\/itt.com.au\/author\/itt-admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is cyber security? - IT&T | Business IT Services and Solutions","description":"Having strong cyber security procedures in place will protect your data from attacks such as computer viruses, data breaches, phishing, and Denial of Service attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itt.com.au\/what-is-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"What is cyber security?","og_description":"Having strong cyber security procedures in place will protect your data from attacks such as computer viruses, data breaches, phishing, and Denial of Service attacks.","og_url":"https:\/\/itt.com.au\/what-is-cyber-security\/","og_site_name":"IT&T | Business IT Services and Solutions","article_publisher":"https:\/\/www.facebook.com\/pages\/ITT-Pty-Ltd\/268794825213","article_published_time":"2020-03-16T06:55:51+00:00","og_image":[{"width":1301,"height":728,"url":"https:\/\/itt.com.au\/wp-content\/uploads\/2020\/03\/Cyber-Security-1300w-min.jpg","type":"image\/jpeg"}],"author":"itt-admin","twitter_card":"summary_large_image","twitter_creator":"@ITT2500","twitter_site":"@ITT2500","twitter_misc":{"Written by":"itt-admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itt.com.au\/what-is-cyber-security\/#article","isPartOf":{"@id":"https:\/\/itt.com.au\/what-is-cyber-security\/"},"author":{"name":"itt-admin","@id":"https:\/\/itt.com.au\/#\/schema\/person\/7c217fee9a41c7ae0fbbac51d10cdab1"},"headline":"What is cyber security?","datePublished":"2020-03-16T06:55:51+00:00","dateModified":"2020-03-16T06:55:51+00:00","mainEntityOfPage":{"@id":"https:\/\/itt.com.au\/what-is-cyber-security\/"},"wordCount":338,"commentCount":0,"publisher":{"@id":"https:\/\/itt.com.au\/#organization"},"image":{"@id":"https:\/\/itt.com.au\/what-is-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/itt.com.au\/wp-content\/uploads\/2020\/03\/Cyber-Security-1300w-min.jpg","keywords":["Blog"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itt.com.au\/what-is-cyber-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itt.com.au\/what-is-cyber-security\/","url":"https:\/\/itt.com.au\/what-is-cyber-security\/","name":"What is cyber security? - IT&T | Business IT Services and Solutions","isPartOf":{"@id":"https:\/\/itt.com.au\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itt.com.au\/what-is-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/itt.com.au\/what-is-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/itt.com.au\/wp-content\/uploads\/2020\/03\/Cyber-Security-1300w-min.jpg","datePublished":"2020-03-16T06:55:51+00:00","dateModified":"2020-03-16T06:55:51+00:00","description":"Having strong cyber security procedures in place will protect your data from attacks such as computer viruses, data breaches, phishing, and Denial of Service attacks.","breadcrumb":{"@id":"https:\/\/itt.com.au\/what-is-cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itt.com.au\/what-is-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itt.com.au\/what-is-cyber-security\/#primaryimage","url":"https:\/\/itt.com.au\/wp-content\/uploads\/2020\/03\/Cyber-Security-1300w-min.jpg","contentUrl":"https:\/\/itt.com.au\/wp-content\/uploads\/2020\/03\/Cyber-Security-1300w-min.jpg","width":1301,"height":728},{"@type":"BreadcrumbList","@id":"https:\/\/itt.com.au\/what-is-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itt.com.au\/"},{"@type":"ListItem","position":2,"name":"What is cyber security?"}]},{"@type":"WebSite","@id":"https:\/\/itt.com.au\/#website","url":"https:\/\/itt.com.au\/","name":"IT&T | Business IT Services and Solutions","description":"The better solution","publisher":{"@id":"https:\/\/itt.com.au\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itt.com.au\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itt.com.au\/#organization","name":"IT&T | Business IT Services and Solutions","url":"https:\/\/itt.com.au\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itt.com.au\/#\/schema\/logo\/image\/","url":"https:\/\/itt.com.au\/wp-content\/uploads\/2023\/05\/Logo-itt.svg","contentUrl":"https:\/\/itt.com.au\/wp-content\/uploads\/2023\/05\/Logo-itt.svg","width":1,"height":1,"caption":"IT&T | Business IT Services and Solutions"},"image":{"@id":"https:\/\/itt.com.au\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/ITT-Pty-Ltd\/268794825213","https:\/\/x.com\/ITT2500","https:\/\/www.youtube.com\/channel\/UCdEqeP6rJVRssjnv1HWig2Q","https:\/\/www.instagram.com\/itt_wollongong\/"]},{"@type":"Person","@id":"https:\/\/itt.com.au\/#\/schema\/person\/7c217fee9a41c7ae0fbbac51d10cdab1","name":"itt-admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itt.com.au\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0e210a3f1f5cf1082adab126cc1a9e4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0e210a3f1f5cf1082adab126cc1a9e4a?s=96&d=mm&r=g","caption":"itt-admin"},"sameAs":["https:\/\/itt.com.au"],"url":"https:\/\/itt.com.au\/author\/itt-admin\/"}]}},"_links":{"self":[{"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/posts\/21615"}],"collection":[{"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/comments?post=21615"}],"version-history":[{"count":0,"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/posts\/21615\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/media\/39510"}],"wp:attachment":[{"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/media?parent=21615"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/categories?post=21615"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/tags?post=21615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}