{"id":10935,"date":"2025-02-17T15:36:10","date_gmt":"2025-02-17T23:36:10","guid":{"rendered":"http:\/\/www.sumologic.com\/?post_type=glossary&#038;p=10935"},"modified":"2026-02-26T16:40:58","modified_gmt":"2026-02-27T00:40:58","slug":"cyber-security","status":"publish","type":"glossary","link":"https:\/\/www.sumologic.com\/glossary\/cyber-security","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\n<section class=\"e-stn e-stn-0d652506f82b000a392973813b918ee25d5b4211 e-stn--glossary-inner-content e-stn--table-of-content\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-1f7b3997080fc292474d26ff00c905d99d3520fa e-col--content-wrapper  col-sm-12 col-lg-12 col-xl-12\">\n<h2 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-7777c933665c58df9a699a609359dd48\" id=\"directory\">What is cybersecurity?<\/h2>\n\n\n\n<p>Cybersecurity refers to the set of processes, policies and techniques designed to protect an organization\u2019s computer systems, networks, and connected devices from cyberattacks, unauthorized access, and data breaches. <\/p>\n\n\n\n<p>As the number of cyber threats and malicious software increases, businesses of all sizes, especially those managing critical infrastructure, must adopt cybersecurity best practices to defend against hackers, cybercriminals, and other attackers seeking to exploit vulnerabilities in their digital environments.&nbsp;<\/p>\n\n\n\n<div class=\"e-div e-div-6857ef72445df0ca4ab9eabd490a5b42d5da4400 e-div--list-wrapper\">\n<p class=\"has-eigengrau-color has-text-color has-link-color wp-elements-c1f9bf7a870009e3f2921c5f3b41bc1a\">Key takeaways<\/p>\n\n\n\n<ul class=\"wp-block-list has-delft-blue-color has-text-color has-link-color wp-elements-db8dc5fff5b52e3f55ccf03dcace8c17\">\n<li>Cybersecurity professionals protect organizations from digital attacks and unauthorized access.<\/li>\n\n\n\n<li>Security analysts must review security measures and protocols throughout the IT infrastructure and implement a variety of preventive, detective and retrospective analytical tools to mitigate the consequences of successful attacks, such as identity theft or system downtime.<\/li>\n\n\n\n<li>Effective cybersecurity countermeasures significantly reduce the risk of a data breach that could cost your company millions of dollars.<\/li>\n\n\n\n<li>Sumo Logic Cloud SIEM helps your IT organization respond to threats as they occur, streamline forensic investigations and access the most up-to-date <a href=\"https:\/\/www.sumologic.com\/glossary\/threat-intelligence\">threat intelligence<\/a> to maintain your cybersecurity posture.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-6de8cdf3fbf70decc3640600cc65e487\" id=\"features\">How cybersecurity works<\/h3>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-ab1e866d39aca6d840ed0859d238604e\">Cybersecurity is built on a layered defense strategy that includes prevention, detection, and response. Chief Information Security Officers (CISOs) and IT security analysts use multiple tools and frameworks to identify threats, detect suspicious activity, and prevent successful attacks across an organization\u2019s information technology environment.<\/p>\n\n\n\n<p>IT organizations deploy a range of versatile tools, such as antivirus software, firewalls, intrusion detection systems, and security information and event management (SIEM) systems, to safeguard against cyber attacks at various points of vulnerability. There is no single cybersecurity tool that can repel all types of attacks from every known attack vector. Security analysts must review security measures and protocols throughout the\u00a0<a href=\"https:\/\/www.sumologic.com\/glossary\/it-infrastructure\" data-type=\"link\" data-id=\"https:\/\/www.sumologic.com\/glossary\/it-infrastructure\">IT infrastructure<\/a>\u00a0and implement a variety of preventive, detective and retrospective analytical tools to detect cyber attacks and mitigate the consequences of successful attacks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"four-key-areas-of-cybersecurity\">Four key areas of cybersecurity<\/h3>\n\n\n\n<p>We identify four aspects of IT infrastructure that can be secured using cybersecurity tools and technologies.<\/p>\n\n\n\n<p><strong>Application<\/strong> <strong>security<\/strong><br>Today&#8217;s applications are often deployed and supported through web-based portals, making them a potential attack vector for cybercriminals. Cybersecurity operatives deploy security measures to prevent hackers from executing cyber attacks against applications. These include preventive measures such as static security testing, web application firewalls and intrusion detection systems.<\/p>\n\n\n\n<p><strong>Network security<br><\/strong>Network security is a major focus for IT security analysts. Preventive tools, such as network traffic analysis, firewalls, intrusion detection and prevention systems, threat intelligence, and malware analysis platforms, are deployed to detect and mitigate threats as they occur. Additional technologies such as SIM, SEM and<a href=\"https:\/\/www.sumologic.com\/guides\/siem\" data-type=\"link\" data-id=\"https:\/\/www.sumologic.com\/guides\/siem\">&nbsp;SIEM<\/a>&nbsp;cybersecurity tools, network forensics and security orchestration technologies can be implemented to detect attacks that are in progress, identify possible security threats, and perform a retrospective analysis of detected anomalies or outlier data that could indicate a breach.<\/p>\n\n\n\n<p><strong>Endpoint security<br><\/strong>Network endpoints represent an especially vulnerable attack vector, as mobile endpoints such as laptops, mobile phones or tablets may be taken off-site and used to access unsecured networks. Endpoints can be secured using technologies such as host-based intrusion detection, anti-virus and anti-spyware software applications, and device firewalls. Processes such as mobile device management and regular patching updates can help maintain the security posture of network endpoints.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-fda7f54e375defad218e0d91d6dfbdc0\"><strong>Cloud security<br><\/strong>The\u00a0<a href=\"https:\/\/www.sumologic.com\/glossary\/saas\" data-type=\"link\" data-id=\"https:\/\/www.sumologic.com\/glossary\/saas\">SaaS<\/a>\u00a0delivery model for cloud services has resulted in enterprise organizations accessing increasing numbers of applications through web-based application portals. Organizations that subscribe to\u00a0<a href=\"https:\/\/www.sumologic.com\/glossary\/paas\" data-type=\"link\" data-id=\"https:\/\/www.sumologic.com\/glossary\/paas\">platform-as-a-service<\/a>\u00a0(PaaS),\u00a0<a href=\"https:\/\/www.sumologic.com\/glossary\/infrastructure-as-a-service\" data-type=\"link\" data-id=\"https:\/\/www.sumologic.com\/glossary\/infrastructure-as-a-service\">infrastructure-as-a-service<\/a>\u00a0(IaaS), or other types of cloud services may face additional exposure to cybersecurity vulnerabilities through these potential attack vectors. Technologies such as data discovery and classification, anomaly detection, and forensic analysis can be used to prevent, detect, and analyze threats to cloud-based IT infrastructure. Developers will gather the needs for that specific feature, design and code it, test it, receive feedback from customers, and test for errors before finalizing the code.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-2a04838198f82af566e1d577aceae5e9\" id=\"structure\">Why cybersecurity is important for business<\/h3>\n\n\n\n<p>In today&#8217;s technological environment, organizations of all sizes are capturing, creating and storing massive amounts of sensitive data. While this data can be used to inform decision-making and drive value creation, it can also be stolen by cyber attackers with dramatic consequences for the business. We identify three major risks that businesses and IT organizations can mitigate through effective cybersecurity processes and countermeasures.<\/p>\n\n\n\n<p><strong>Cybersecurity supports compliance with standards and regulations<\/strong><\/p>\n\n\n\n<p>If your organization collects payment card information from its customers, you are responsible for complying with the <a href=\"https:\/\/www.sumologic.com\/app-catalog\/pci-compliance\">Payment Card Industry Data Security Standard (PCI DDS)<\/a>. If you collect health care information, such as payment records from Americans, you are probably covered by the Health Insurance Portability and Accountability Act (HIPAA). You may want to maintain an&nbsp;<a href=\"https:\/\/www.sumologic.com\/security\/platform-security\/\">ISO 27001 Information Security Management<\/a>&nbsp;certificate, which requires you to establish effective controls to protect data security and privacy.<\/p>\n\n\n\n<p>Whatever the case, failure to maintain cybersecurity in these instances could result in legal fines and penalties, loss of certification, or a loss of trust with payment card companies, which could ultimately harm your business.<\/p>\n\n\n\n<p><strong>Cybersecurity protects services from unplanned downtime<\/strong><\/p>\n\n\n\n<p>Organizations of all sizes rely on the uninterrupted functioning of core applications to support their most important revenue-driving business processes. For large organizations, the cost of application outages can easily reach the thousands, hundreds of thousands, or even millions of dollars in cases where the outage lasts for much longer than is acceptable.<\/p>\n\n\n\n<p>While many cyber attackers are focused on stealing data that can be sold in illegal marketplaces, cyber attackers can also be initiated by competitor companies who wish to gain an edge by attacking your systems and services.<\/p>\n\n\n\n<p>The financial impact of service outages varies from company to company, with estimates ranging from $90,000 per hour for media companies to nearly $6.5 million per hour for large online financial brokerages. Organizations that implement the necessary procedures and systems to maintain cybersecurity benefit from the reduced application and network downtime that has a direct return on investment for the organization.<\/p>\n\n\n\n<p><strong>Cybersecurity prevents costly data breaches<\/strong><\/p>\n\n\n\n<p>Data breaches are enormously expensive and most IT organizations today are shockingly ineffective at preventing, containing or even detecting them when they happen.<\/p>\n\n\n\n<p>For organizations that respond late to data breaches, the pain doesn&#8217;t end there. Notification costs, fines and penalties, regulatory compliance audits, and litigation can all stem from a single data breach where sensitive customer information is compromised. Effective cybersecurity countermeasures significantly reduce the risk of a data breach that could cost your company millions of dollars.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"enhance-your-cybersecurity-with-sumo-logic\">Enhance your cybersecurity with Sumo Logic<\/h3>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-66302e124357ae52813305ed9d4d7d1b\">When it comes to maintaining cybersecurity throughout your IT infrastructure, organizations must develop capabilities to prevent attacks as they happen, detect and identify possible security threats and forensically analyze data to investigate anomalies and outliers. <a href=\"https:\/\/www.sumologic.com\/solutions\/cloud-siem\">Sumo Logic Cloud SIEM<\/a> benefits your IT organization with data-driven\u00a0<a href=\"https:\/\/www.sumologic.com\/solutions\/threat-detection-investigation\" data-type=\"link\" data-id=\"https:\/\/www.sumologic.com\/solutions\/threat-detection-investigation\">threat detection<\/a>\u00a0and automated incident response capabilities with custom alerts. Sumo Logic helps your IT organization respond to threats as they occur, streamline forensic investigations and access the most up-to-date threat intelligence to maintain your cybersecurity posture.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.sumologic.com\/guides\/siem\">Learn how Sumo Logic Cloud SIEM helps you detect and respond to threats<\/a>.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity refers to the set of processes, policies and techniques that work together to secure and organization against digital attacks.<\/p>\n","protected":false},"author":4,"featured_media":0,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"4","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"translation_priority":[221]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"class_list":["post-10935","glossary","type-glossary","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/glossary\/10935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/types\/glossary"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/users\/4"}],"version-history":[{"count":7,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/glossary\/10935\/revisions"}],"predecessor-version":[{"id":70524,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/glossary\/10935\/revisions\/70524"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media?parent=10935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}