Man standing in a staircase with his mobile phone in hand

Cyber security

What is cyber security or information technology security, why is it important, and what are some common threats and vulnerabilities?

 

 

Cyber security: What is it?

Cyber security is the practice of protecting networks, systems, and programs from digital attacks. That can be attacks such as social engineering, financial cyber crime, and other types.

Cyber attacks are usually aimed at interrupting business processes; obtaining financial gain; or accessing, changing, or destroying sensitive information. Cyber security may also be referred to as information technology security. 

The core of cyber security is about businesses building a strong security culture. It is also about raising security awareness among citizens to prevent cyber crime from happening–and succeeding. Whether we talk about individuals, businesses, or governments, our entire society depends on a safe, stable, and resilient cyber space. 

Get a full introduction to cyber security

Why is cyber security important?

Governments, the military, and other socially critical organisations collect, process, and store large amounts of data on computers, in data warehouses and other devices. Much of this data can include sensitive information.

Exposure of this data, such as personal information, financial data, intellectual property, can in many cases have negative consequences. This includes harm to business competitiveness, citizen trust in institutions, consumer trust in companies, and personal reputations.

Establishing a strong security culture within organisations—as well as raising awareness among the world’s citizens—is becoming increasingly important. Now, as cyber security faces more sophisticated threats, the focus on solutions needs to be even stronger.

Learn more about why cyber security is such an important topic.

Cyber security threats and vulnerabilities

A cyber security threat is a malicious act with the intent of accessing, stealing, or damaging data. These acts can come in a variety of forms that can be devastating to an individual, a business, and society as a whole. Cyber attackers can also have a goal to damage a person’s reputation or perform extortion of different kinds. 

Two of the most widespread types of cyber attacks are different types of social engineering, also known as social manipulation, and financial cyber crime. Often, cyber criminals gain advantage by exploiting vulnerabilities in code. 

What might such attacks look like?

White box and blue arrow pointing down

Malware

Malicious code that the victim is tricked into downloading. Malware often infects devices through phishing or smishing (see definitions below).

White laptop with blue cloud and yellow keylock icons next to it

Ransomware

Attacks where the attacker locks the user’s system files and demands a payment to decrypt and unlock them.

White box opening up and yellow, blue and white squares coming out

Social engineering

Manipulation technique where cyber criminals trick users into carrying out specific actions. This includes providing confidential information, transferring money, or downloading files that install malware on the company network.

Three white text documents

Phishing

Tactics include fake emails, websites, and text messages to steal information. These emails are sent to thousands of people and do not target you specifically. Phishing attacks might also be performed through SMS (smishing) or voice mails and phone calls (vishing). 

How we work with security in Visma

For us at Visma, security is and will continue to be one of our main priorities. That means it is integrated into all parts of our complex organisation. We do this to ensure that our customers’ data, our own data, and our own infrastructure are top-notch. This is a basic requirement for our business and services. It is, and will continue to be, one of our highest concerns.

We work with security in several ways. One is to establish a strong security culture among our employees. Another is to ensure that we have established processes, methods, technologies and embraced proven standards. This is to ensure security and accessibility for our customers.

The nature of security threats and cybercrime is constantly changing. In our role as a cloud solutions provider, we have made security awareness a natural part of our process.

Learn more about our security efforts in our Trust Centre

Questions and answers about cyber security

Editor's picks in security

Man writing code on his computer, looking concentrated

Cloud security: Frequently asked questions

How secure are cloud solutions? What initiatives are cloud providers taking to make sure the data on their servers are secure? And what are the most important cloud security challenges today? We have asked one of the security experts at Visma, Stian Estil, to answer these questions.

Man and girl sitting in a sofa looking at a laptop and mobile phone

Cyber security: Can we trust cloud computing services?

“It’s a bit like insurances. Perceived as an unnecessary expense, until the day chaos erupts. Then most people are well satisfied with the investment.” We have talked to Security Director at Visma, Espen Johansen, about cloud security.

Man in a brown singlet sitting on a table outside looking at his laptop

What is fake news?

What is fake news and why has fake news become such a large industry? We dig deeper into the different types of fake news and how it can be used to interfere in elections, economies, and geopolitical conflicts.