Your feedback is essential to help us improve - click here to take our 3 minute survey.

What is cybersecurity and why is it important?

What is cybersecurity and why is it important?
Image source: Getty Images

It’s not uncommon to hear people complaining of hacked accounts or that they can’t access their servers or networking systems. With the internet playing a significant part in our lives, it is more important than ever to embrace cybersecurity. This applies to both individuals and companies.

What is meant by ‘cybersecurity’?

Cybersecurity involves measures taken to protect internet-connected systems and devices like computers, laptops, smartphones, tablets and servers from cyberattacks.

Cyberattacks are attempts by hackers to destroy a computer system or network or steal, delete or encrypt data. Hackers can also access your personal information and use it illegally or to access your money.

What are the four types of cyberattacks?


This is malicious software that steals, deletes or encrypts your data. It gets into your device when you download files from unknown or untrustworthy sources or open unsafe links. Examples of malware include Trojans, adware, bad bots and ransomware.

  • Trojans create ways for hackers to get into your network or system.
  • Adware displays unwanted advertisements on your device, especially in the form of pop-ups.
  • Bad bots are software programs that automate repetitive tasks. They collect passwords, personal information and financial data, and they log keystrokes.
  • Ransomware locks you out of your system. An attacker may demand you pay a ransom to get access.


This is when you receive an email that looks like it’s from a trustworthy source but isn’t. It may ask you to send personal information, which you might send thinking you are emailing a trustworthy company. This information could be enough to gain access to your online accounts, especially those that use the same passwords.

You may also fall victim to phishing websites. An example is when you want to visit the website ‘’. A phishing website might look identical and have a very similar URL, such as ‘’. If you accidentally visit the phishing website and enter your personal information, hackers can access it.

Water holing

This is when an attacker takes advantage of trusted and popular websites. The attacker finds weaknesses in the sites’ cybersecurity and uses them to deliver malware.

Of course, it is not uncommon for users to act rather carelessly when visiting trusted websites. You may click on malicious links unknowingly and infect your device with malware.

Distributed denial-of-service (DDoS)

This is an attack directed at servers. The hacker bombards institutions’ or companies’ servers with non-stop data requests, overwhelming them. If you send a legitimate request to the server, it won’t be fulfilled, meaning you can’t carry out work normally. That is why the name of the attack is denial-of-service. 

The types of cyberattacks covered above are the most common. This doesn’t mean you won’t come across others. Hackers are getting smarter and devising new ways to attack every day.

How can cybersecurity risk be reduced?

It’s wise to stay abreast of the most common types of cyberattacks you might face. The National Cyber Security Centre website is a useful resource that’s kept up to date with the latest attacks.

Additionally, consider the following cybersecurity solutions:

  • Always keep your guard up when using the internet. This may help you avert phishing and water holing attacks.
  • Buy genuine and reliable anti-virus and anti-malware software for your devices. As the name suggests, the software protects your devices from viruses and malware.
  • Hire cyber specialists and analysts to install and manage servers and networking systems. Cyber analysts have the skills and knowledge to apply protective layers of security to your servers and networking systems. 
  • Enrol for two-factor authentication (2FA). This is an extra layer of security for your online accounts. Once users enter their details and click the ‘login’ button, they need to insert a two-factor authentication code. It is only accessible on a smartphone, using an app like Google Authenticator.

Paying credit card interest? Time to switch to a 0% balance transfer card.

If you can’t afford to clear your credit card balance at the moment and are paying monthly interest, then check to see if you can shift that debt to a new credit card with a long 0% interest free balance transfer period. It could save you money.

By transferring the balance of any existing card (or cards) to a new 0% card, you could be debt-free more quickly – since your repayments will go entirely towards clearing the balance of the debt you owe, and not on interest charges.

Discover our top-rated picks for 0% balance transfer credit cards here and check your eligibility before you apply in just a few minutes – it’s free and won’t affect your credit score.

Was this article helpful?

Some offers on The Motley Fool UK site are from our partners — it’s how we make money and keep this site going. But does that impact our ratings? Nope. Our commitment is to you. If a product isn’t any good, our rating will reflect that, or we won’t list it at all. Also, while we aim to feature the best products available, we do not review every product on the market. Learn more here. The statements above are The Motley Fool’s alone and have not been provided or endorsed by bank advertisers. John Mackey, CEO of Whole Foods Market, an Amazon subsidiary, is a member of The Motley Fool’s board of directors. The Motley Fool UK has recommended Barclays, Hargreaves Lansdown, HSBC Holdings, Lloyds Banking Group, Mastercard, and Tesco.