{"id":15513,"date":"2021-10-05T14:44:32","date_gmt":"2021-10-05T12:44:32","guid":{"rendered":"https:\/\/blogs.sun.ac.za\/it\/?p=15513"},"modified":"2021-10-06T15:20:56","modified_gmt":"2021-10-06T13:20:56","slug":"why-is-cyber-security-important","status":"publish","type":"post","link":"https:\/\/blogs.sun.ac.za\/it\/2021\/10\/why-is-cyber-security-important\/","title":{"rendered":"[:en]Why is cyber security important?[:af]Hoekom is kubersekuriteit belangrik?[:]"},"content":{"rendered":"<p>[:en]<\/p>\n<p>Cyber security is the skill and ability of protecting networks, devices, and data from unlawful access or criminal use and the practice of guaranteeing confidentiality, integrity, and availability of information.<\/p>\n<p>Communication, transportation, shopping, and medicine are just some of the things that rely on computers systems and the Internet now. Much of your personal information is stored either on your computer, smartphone, tablet or possibly on someone else\u2019s system. Knowing how to protect the information that you have stored is of high importance not just for an individual but for an organisation and those in it.<\/p>\n<p>Did you know that:<\/p>\n<ul>\n<li>As of 2021, there is a ransomware attack every 11 seconds, up from 39 seconds in 20191,2<\/li>\n<li>43% of cyber-attacks target of small businesses, and they have grown 400 percent since the outbreak began<\/li>\n<\/ul>\n<p>More tips and resources can be found <a href=\"http:\/\/admin.sun.ac.za\/infoteg\/dokumente\/cybersecurity\/why.pdf\">here<\/a>.\u00a0<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.sun.ac.za\/it\/files\/2021\/10\/ransomware-2318381_960_720-300x168.jpg\" alt=\"\" width=\"300\" height=\"168\" align=\"right\" \/>The US government&#8217;s Cybersecurity and Infrastructure Security Agency has made a collection of tip sheets available for use. These downloadable PDF documents contain all the information you need to protect yourself from cyber security risks in a convenient, compact format.\u00a0<\/p>\n<ul>\n<li><a href=\"http:\/\/admin.sun.ac.za\/infoteg\/dokumente\/cybersecurity\/cybersecurity_starts_with_you.pdf\">Cyber security starts with you<\/a><\/li>\n<li><a href=\"http:\/\/admin.sun.ac.za\/infoteg\/dokumente\/cybersecurity\/creating_passwords.pdf\">Creating strong passwords<\/a><\/li>\n<li><a href=\"http:\/\/admin.sun.ac.za\/infoteg\/dokumente\/cybersecurity\/cybersecure_at_work.pdf\">Cyber security at the office<\/a><\/li>\n<li><a href=\"http:\/\/admin.sun.ac.za\/infoteg\/dokumente\/cybersecurity\/identity_theft_and_internet_scams.pdf\">Identity theft and internet scams<\/a><\/li>\n<li><a href=\"http:\/\/admin.sun.ac.za\/infoteg\/dokumente\/cybersecurity\/mfa.pdf\">MFA (Multi-factor authentication)<\/a> <br \/>\nAlso read more on MFA for Stellenbosch University staff and students <a href=\"https:\/\/blogs.sun.ac.za\/it\/en\/2020\/05\/what-is-mfa\/\" target=\"_blank\" rel=\"noopener\">on our blog<\/a><\/li>\n<li><a href=\"http:\/\/admin.sun.ac.za\/infoteg\/dokumente\/cybersecurity\/online_privacy.pdf\">Online privacy<\/a><\/li>\n<li><a href=\"http:\/\/admin.sun.ac.za\/infoteg\/dokumente\/cybersecurity\/phishing.pdf\">Phishing and spoofing<\/a><\/li>\n<li><a href=\"http:\/\/admin.sun.ac.za\/infoteg\/dokumente\/cybersecurity\/protecting_digital_home.pdf\">Protecting your digital home<\/a><\/li>\n<li><a href=\"http:\/\/admin.sun.ac.za\/infoteg\/dokumente\/cybersecurity\/social_media.pdf\">Cyber safety on social media<\/a><\/li>\n<li><a href=\"http:\/\/admin.sun.ac.za\/infoteg\/dokumente\/cybersecurity\/travel.pdf\">Cyber security while travelling<\/a><\/li>\n<\/ul>\n<p style=\"text-align: left;\">More tips and resources can be found <a href=\"http:\/\/admin.sun.ac.za\/infoteg\/dokumente\/cybersecurity\/why.pdf\">here<\/a>.\u00a0<\/p>\n<p style=\"text-align: right;\">[SOURCE:\u00a0 <a href=\"https:\/\/www.cisa.gov\/publication\/cybersecurity-awareness-month-publications\">Cybersecurity and Infrastructure Security Agency, United States Government<\/a>)\u00a0<\/p>\n<p>[:af]<\/p>\n<p>Kubersekuriteit is die vaardigheid en vermo\u00eb om netwerke, toestelle en data van onwettige toegang op kriminele gebruik te beskerm en die praktyk om vertroulikheid, integriteit en die beskikbaarheid van inligting te waarborg.\u00a0<\/p>\n<p>Kommunikasie, vervoer, handel en geneeskunde is slegs enkele areas wat afhanklik is van rekenaars en die Internet. `n Groot hoeveelheid van jou persoonlike inligting word op jou slimfoon, rekenaar, tablet of elders op iemand anders se stelsels gestoor. Die vermo\u00eb en kennis om jou gestoorde inligting te kan beskerm is van kardinale belang nie net vir jou as individu nie, maar ook vir jou organisasie en kollegas.<\/p>\n<p>Het jy geweet dat:<\/p>\n<ul>\n<li>Vanaf 2021, vind daar elke 11 sekondes `n losprysware-aanval\u00a0(<em>ransomware<\/em>). In 2019 was dit elke 39 sekondes, `n duidelike toename.<\/li>\n<li>43% van kuberaanvalle teiken klein besighede. Hierdie aanvalle het met 400% gestyg sedert die begin van COVID.\u00a0<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.sun.ac.za\/it\/files\/2021\/10\/ransomware-2318381_960_720-300x168.jpg\" alt=\"\" width=\"300\" height=\"168\" align=\"right\" \/>Amerika se <em>Cybersecurity and Infrastructure Security Agency<\/em> het `n versameling wenkblaaie beskikbaar gestel vir algemene gebruik. Hierdie aflaaibare PDF-dokumente bevat al die inligting wat jy benodig om jouself te beskerm in `n handige, kompakte formaat.<\/p>\n<ul>\n<li><a href=\"http:\/\/admin.sun.ac.za\/infoteg\/dokumente\/cybersecurity\/cybersecurity_starts_with_you.pdf\">Kubersekuriteit begin by jou<\/a><\/li>\n<li><a href=\"http:\/\/admin.sun.ac.za\/infoteg\/dokumente\/cybersecurity\/creating_passwords.pdf\">Hoe om sterk wagwoorde te kies<\/a><\/li>\n<li><a href=\"http:\/\/admin.sun.ac.za\/infoteg\/dokumente\/cybersecurity\/cybersecure_at_work.pdf\">Kubersekuriteit by die kantoor<\/a><\/li>\n<li><a href=\"http:\/\/admin.sun.ac.za\/infoteg\/dokumente\/cybersecurity\/identity_theft_and_internet_scams.pdf\">Identiteitsdiefstal en internetbedrog<\/a><\/li>\n<li><a href=\"http:\/\/admin.sun.ac.za\/infoteg\/dokumente\/cybersecurity\/mfa.pdf\">MFA (Veelfaktor-bekragtiging)<\/a> <br \/>\nLees ook meer oor MFA vir US-studente en personeel <a href=\"https:\/\/blogs.sun.ac.za\/it\/af\/2020\/05\/what-is-mfa\/\" target=\"_blank\" rel=\"noopener\">op ons blog<\/a><\/li>\n<li><a href=\"http:\/\/admin.sun.ac.za\/infoteg\/dokumente\/cybersecurity\/online_privacy.pdf\">Privaatheid aanlyn<\/a><\/li>\n<li><a href=\"http:\/\/admin.sun.ac.za\/infoteg\/dokumente\/cybersecurity\/phishing.pdf\">Uitvissing en verkullery<\/a><\/li>\n<li><a href=\"http:\/\/admin.sun.ac.za\/infoteg\/dokumente\/cybersecurity\/protecting_digital_home.pdf\">Beskerm jou digitale tuiste<\/a><\/li>\n<li><a href=\"http:\/\/admin.sun.ac.za\/infoteg\/dokumente\/cybersecurity\/social_media.pdf\">Sosiale media kuberveiligheid<\/a><\/li>\n<li><a href=\"http:\/\/admin.sun.ac.za\/infoteg\/dokumente\/cybersecurity\/travel.pdf\">Kubersekuriteit wanneer jy reis<\/a><\/li>\n<\/ul>\n<p>Meer wenke en hulpbronne kan <a href=\"http:\/\/admin.sun.ac.za\/infoteg\/dokumente\/cybersecurity\/why.pdf\">hier<\/a> verkry word.\u00a0<\/p>\n<p style=\"text-align: right;\">\n<p>[BRON:\u00a0 <a href=\"https:\/\/www.cisa.gov\/publication\/cybersecurity-awareness-month-publications\">Cybersecurity and Infrastructure Security Agency, United States Government<\/a>)\u00a0<\/p>\n<p>[:]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[:en] Cyber security is the skill and ability of protecting networks, devices, and data from unlawful access or criminal use and the practice of guaranteeing confidentiality, integrity, and availability of information. Communication, transportation, shopping, and medicine are just some of the things that rely on computers systems and the Internet now. Much of your personal [&hellip;]<\/p>\n","protected":false},"author":259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3256,20381,29187,48737,44],"tags":[],"class_list":["post-15513","post","type-post","status-publish","format-standard","hentry","category-news","category-phishing","category-security-2","category-tips-2","category-training"],"publishpress_future_action":{"enabled":false,"date":"2026-05-08 03:43:04","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/15513","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/comments?post=15513"}],"version-history":[{"count":6,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/15513\/revisions"}],"predecessor-version":[{"id":15546,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/15513\/revisions\/15546"}],"wp:attachment":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/media?parent=15513"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/categories?post=15513"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/tags?post=15513"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}