Cybersecurity in 2021

VNC CyberSecurity 2021

Cybersecurity in 2021

  • Posted On January 29, 2021
  • Posted By Vu Nguyen


Cybersecurity is the body of processes, technologies, and practices that have been put in place to protect devices, networks, data, and programs from damage, attack, and unauthorized access. Cybersecurity is also known as Information technology security.

The importance of cybersecurity cannot be overemphasized, as several institutions, including the government, corporate, healthcare, and financial institutions all collect sensitive data that are stored on computers and other types of devices.

Asides from storage, these institutions also transmit these data using networks from one device to another. Businesses have embraced technology, and this has made their operations more straightforward. However, it has also exposed them to potential cyber threats.

Elements of cybersecurity

Cybersecurity can be used in different contexts…

  • Network security is the process of safeguarding a computer network from invaders. It could be from opportunistic malware or targeted attackers.
  • Information security is the process that guards the privacy and integrity of data for both storage and transmission.
  • Application security is the cybersecurity branch that focuses on guarding devices and software against threats. Application has data that can be accessed; therefore, it needs to be secured.
  • Endpoint security is the protection against threats that could affect remote access to an organization’s network. More businesses embrace the remote way of working in times like this, which has made Endpoint security even more critical than ever.
  • Operational security is the protection of data assets. This is the cybersecurity branch that protects the permissions and procedures of stored and shared data by users.
  • Disaster recovery and business continuity are ways an institution or organization responds when cybersecurity incidents affect them.
  • End-user education is the process of imparting knowledge about good habits to protect end-users. The end-user could be customers or employees of an organization.

Types of cyber threats

There are different types of cyber threats, but they are broadly categorized into three types.

  • Cyber-attack often has a political motivation behind the information threat.
  • Cybercrime is the process where individuals or groups target systems to cause disruption or for financial gains.
  • Cyber terrorism is the act of creating fear and panic by destabilizing electronic systems.

There are some methods used by individuals or groups that threaten cybersecurity


Malware is about malicious software. Malware is one of the common ways cybercriminals can damage a user’s computer. It often spreads through dangerous email attachments or questionable download links.

There are different types of malware:

  • Ransomware locks a user’s data and files until they pay a ransom. The user is often threatened with the erasure of this data.
  • A Virus is a program that infects a user’s system with a malicious code and replicates itself.
  • A Trojan is a malware that is packaged as legitimate software, and it can cause damage to a user’s data
  • Spyware is a type of malware that secretly records a user’s actions.


Phishing is the act of cybercriminals targeting users through emails that looks legitimate, requesting sensitive information from them. It is usually used to get credit card info and other personal info.

Man-in-the-middle attack

The man-in-the-middle attack is a cybercrime where the cybercriminal intercepts communication between individuals to steal data.

SQL Injection

This cyber-attack is used to control or steal data from a database. Data-driven applications’ irregularities are exploited through a malicious code that allows illegal access to the data.

How to guard against cyber threats and attacks

  • Individuals and organizations can guard against these cyber threats using the following tips:
  • Use an antivirus software
  • Frequently update your operating system and software
  • Deploy strong passwords
  • Vet email attachments before opening them
  • Do not click on links in emails from questionable sources and senders
  • Avoid the use of insecure Wi-Fi networks, especially in public spaces

If you would like more information about IT services and how to utilize IT professionals for your facility, one of our representatives at VN Consulting will be happy to assist you with a consultation and determine the IT services you need. Contact us today for more information.

Get Rid of Your IT Headaches for Good

You want to spend your time managing your business—not putting out fires for every IT issue that arises. Bringing deep IT experience to bear, we create tailored solutions for every client.