There has been much confusion around three names in the computer field. Cyber Security (Cybersecurity), Information Technology (IT) and Information Security (InFoSec). I believe knowing the differences between these names will save business owners billions of dollars over the long term. It will equip them to ask the right questions when it comes to saving their businesses from breaches. Today most business owners believed they are protected or believe they won’t get breached because it will always happen to someone else, but not our business.
What is Information Technology?
“Information Technology (IT) refers to the use of computer technology to manage information. The field of IT encompasses all computer software, hardware and related devices employed in the processing, transfer, storage, and dissemination of data whether it’s on a computer, smartphone, TV or other medium. Every time you download a song, stream a movie, check your email or perform a web search, you’re accessing IT services. Areas of study that fall within IT include database development, computer networking, software engineering, data analysis and more”.
“Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them. These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms.”
Cybersecurity personnel understands how hackers can change, intercept or steal transmitted company data within your local network or over the internet. They deploy software or hardware to block or prevent unauthorized access of transmitted data. They are also known as an “ethical hacker” or penetration tester. They find holes in your network before hackers do and repair them.
“Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative”.
“Cyber security has never been simple. And because attacks evolve every day as attackers become more inventive, it is critical to properly define cyber security and identify what constitutes good cyber security.