What Is Cybersecurity?

Let's begin with what we mean by cybersecurity

Cybersecurity is a broad term that encompasses a variety of ways to protect from the attack vectors that a hacker can utilize to access proprietary information. Typically, their goal is to acquire sensitive data to sell on the dark web for profit. Your data has real value to hackers. Below are some of the most common attacks.


As implied, ransomware is a kind of malware that, when set free on your systems, block access to your data until you pay a ransom to regain access to your systems. Ransomware is often distributed through an email with an innocent-looking attachment containing the malware. It can also be distributed through a link contained in the email, and visiting that site unleashes the attack. Just as with kidnappings, the FBI discourages the payment of ransom, as there is no guarantee that your data will be released. Payment also rewards the bad actor, encouraging them to try again, with you or another firm.


As with ransomware, phishing is also distributed via email. Often these emails are made to look like they have been sent from a company or contact that is familiar and trusted to get recipients to reveal personal information. There is even a form of phishing called Whaling, targeting successful executives. Often they are "fishing" for passwords, banking details, credit card numbers. Then there is spear phishing where a more personalized message is sent because they have researched a specific target. These attacks can be tough to detect, as they are so targeted.

Distributed Denial of Service (DDoS)

DDoS is a continual and robust series of attacks on a system's resources, overwhelming the system and causing it to shut down. Although the attacker is not directly financially gaining from this kind of attack, they may only be looking for the satisfaction of creating a service interruption. We have seen competitive companies launching DDoS attacks to interrupt a competitor's business.


Also referred to as "Man-in-the-Middle." As the names imply, communications between a client and trusted servers are hijacked by the hacker intercepting the information. Often the attackers send a packet that mimics the intended host and disperses malware on your system.

Insider Threats

The inside job as it were, is when data is stolen by someone or something inside of your network. Many times a trusted individual will copy important company information ranging from product specs, financial details, or other valuable information that may cause significant damage to the company. These insiders could be employees past and present, contractors, or anyone else that may have direct access to your network inside of your firewall, antivirus, and endpoint protection.

IT services