3 minute read

Introduction to Cybersecurity

When using computers, tablets or smartphones for internet banking, online shopping, sending and receiving emails or social media, it is vital to take necessary steps to prevent hackers and cybercriminals from getting hold of your data.

We all spend more time online, which means more opportunities for cybercriminals to carry out cyberattacks by targeting people and businesses using:

  • Email and website scams
  • Malware software that can damage your device or let a hacker into your computer system.

If hackers get into your device or accounts, they could access your money, your personal information, or information about your organisation.

Cybersecurity is all about protecting the devices we use and services we access while online, either at home or work and preventing unauthorised access, theft of valuable information and sensitive data or damage caused by cyber-attacks.

Who are Cybercriminals?


Black Hats 

Not all cybercriminals are hooded young male individuals (black hats), but a varied group of malicious attackers young, and old, men and women, from all over the world driven by a range of devious motives.

Black Hats unofficial mascot is the image of Guy Fawkes, known as hackers often working in gang’s and using computer systems to gain access to business and personal information for malicious and exploitive purposes.

However, cybercriminals are difficult to identify due to the cunning and shady security measures they use to protect their identity.

Script Kiddies  

These less experienced malicious hackers are usually only able to attack very weakly secured systems, using existing software developed by others to launch hacking attacks.


The growth of the cybercriminal network globally is due to the increased use of the internet opening a window of opportunity for financial incentives, has created a number of different types of cybercriminals, many of which present a major threat to individuals, organisations and even governments.

Types of Cyberattacks

There are many ways cybercriminals hack into a website or computer networks. Below are some of the most common methods used.

A type of malicious software whose intent is to exploit a user’s vulnerability when they click on a dangerous link or open an email attachment that subsequently installs malicious software on their computer.
Once infected, malware can obtain information by retrieving data from the hard drive disrupting the computer system and making it inoperable.

Types of Malware attacks:

A virus is a specific type of malware that infect software applications and computer files and then self-replicates by inserting its code into other programs in the computer system.

Trojan Horse
Typically hidden in an email from someone you know and click on what looks like a legitimate link, application or attachment. Once downloaded and opened it installs malware and takes control of your device.

How to avoid a Cyberattack

MOVEit Cyberattack

The full guide describes the types of cyberattacks, and the steps to take to avoid them.

Follow, like, share and subscribe

All images images, photographs and videos used on this website, are purchased, free stock, or CC0 and accredited to the artist where possible.

The information contained within this article does in no way constitute legal advice. While we strive to keep the information up to date and correct, we make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability, or availability with respect to the website or the information, articles, templates, or related graphics contained on the website. Any reliance you place on such information is therefore strictly at your own risk.
error: Content is protected !!