Why is Cybersecurity Important?

12 Things You Must Know About Cybersecurity to Prevent Your Money from Being Stolen in 2023
Jan 10, 2023 By Will Hurd
Updated: Dec 27, 2023
Laptop Image

The Internet is full of threats that could harm your computers, mobile devices, tablets, or other connected products. It’s important to understand how these threats work so you can keep yourself safe online, prevent data breaches and be protected from a cyber attack.

The Current State of Cybersecurity and the Consumer

Two years ago, Americans lost $4.5 billion because of cybercrime. Two years from now the amount of money lost is expected to be $10.5 trillion.

Unfortunately, we all must take an active role in protecting ourselves, our households, and our places of work. We can’t just leave cybersecurity up to the cyber security professionals at our employers or cyber security specialists who work at the companies whose applications and software we use.

Cybersecurity is complicated but everyone can do it. Let’s begin our 10 things we need to know to protect ourselves with something simple.

1. Cybersecurity and cyber security are the same thing.

One of the first questions I often get asked is whether cybersecurity is one word or two? I follow what many in the cybersecurity community in America do and spell it as one word with the exception being when using it as an adjective to designate a certain kind of security out of many options.

Whether it’s spelled as one word or two, the definition and concepts remain the same. The best cybersecurity definition in my opinion is as follows:

  • Cybersecurity is the branch of information security that helps protect data and information in our digital systems from a cyber attack.

This leads into the second most asked question I get, what is a cyber attack?  

  • A cyber attack is any type of unauthorized or malicious activity that takes place over a computer network. Cyber attacks can take many forms, but some common examples include:
    • Distributed denial of service (DDoS) attacks, which aim to make a website or server inaccessible by flooding it with traffic.
    • Ransomware attacks, in which malware encrypts a victim’s files and the victim must pay a ransom to get access to the encrypted files.
    • Phishing attacks, in which fraudulent messages are used to trick someone into giving away sensitive information like passwords or credit card numbers.
    • Intrusion attacks, in which a hacker gains unauthorized access to a system and may steal, damage, or alter data.

2. In cybersecurity, data is the coin of the realm.

Finances Online

Source: Finances Online

Current events in cybersecurity have made data become extremely valuable in today’s world increasing the threat of identity theft. Attackers are evolving their practices from gaining control of computer systems or devices to gaining access to sensitive data like your user credentials or account information.

This sensitive data can also include personally identifiable information (PII), health information, private communications, customer data and intellectual property.

  • Personally identifiable information (PII) refers to any data that can be used to identify a specific individual. This type of information is often targeted by hackers or scammers in order to exploit or steal someone’s identity. PII can include things like name, address, date of birth, social security number, or credit card number.

A user’s identity or credentials are becoming more valuable to attackers than gaining technical access to a user’s device, making data theft an increasing threat and data security even more important. The first and most important step in data security is password protection – have a unique 14-character-plus password for each site requiring a password.

3. Phishing attacks start more than 90% of successful cyber attacks. 

Screenshot of an actual phishing text message

Screenshot of an actual phishing text message

So, think before you click. Typically, phishing attacks will involve a scammer sending an email or text message that looks like it is from a reputable company or organization, in order to trick the target into revealing sensitive data like passwords or PII that is then used by the attackers to conduct data breaches.

Once bad guys have this information, they can use it on legitimate sites, or they may try to get you to run malware.

  • Malware is a type of malicious software designed to gain access to a computer system without the owner’s knowledge and permission. It can take many forms, including viruses, worms, ransomware, and spyware.

If you get an email you don’t expect or from a user you don’t recognize, trust your instincts – don’t open it and think before you click on links. The Cybersecurity & Infrastructure Security Agency (CISA) has some good tips on phishing prevention.

4. More than half of cyber attacks and data breaches could be prevented with up-to-date software on your devices.

Microsoft Windows display showing patches are available

Microsoft Windows display showing patches are available

If you or your employer do not have the proper security infrastructure and practices in place, cybercriminals will easily target you. According to a study conducted in 2018, an alarming 57% of cyberattack victims report that their breaches could have been prevented by installing an available patch, and 34% of those respondents were already aware of the vulnerability before they were attacked.

  • Patching is the process of updating computer software to fix security vulnerabilities and improve the overall performance of the system. It involves installing patches, which are small pieces of code, to address security flaws, improve system stability, and add new features.

Patching is important for keeping systems secure and up to date, as security vulnerabilities can be exploited by malicious actors. So make sure you have ways of keeping up to date important types of software like:

  • web browser
  • third-party apps
  • antivirus software
  • operating system (OS)

Most OS’s – Windows, Apple, LINUX – support automatic updates but this feature needs to be enabled. But to stay safe in this increasingly digital world, a consumer needs to have their own plan for patching promptly to protect themself.

5. Malvertising can lead to ransomware attacks.

Malicious advertisement promoting a fake Chess app

Malicious advertisement promoting a fake Chess app, Source: Bleeping Computer

Advertisements, like the above ad for a fake Chess app, are a prime example of malvertising. When a user clicks on the ad, they are then taken to a fake Microsoft Store page (see image below) for a fake online chess application, which is automatically downloaded from one of the legitimate cloud services used by the attacker.

Fake Microsoft Store page distributing the Ficker malware

Fake Microsoft Store page distributing the Ficker malware, Source: Bleeping Computer

The downloaded file is not a Chess app but information-stealing malware in disguise. Malvertising is a particularly effective method of spreading ransomware, as it allows cyber criminals to target large numbers of users quickly and without their knowledge.

  • Malvertising stands for malicious advertising and is a type of online advertising that uses malicious code to spread malware or deploy ransomware. Malvertising involves the use of malicious code embedded in legitimate online advertisements, which once clicked redirect users to malicious sites or download malicious files without the user’s knowledge.

Malvertising is used to install ransomware by exploiting weaknesses in web browsers, such as outdated plugins or software. The quickest way to avoid being a target of malvertising is to enable ad blocking in your web browser, but this also limits your ability to see legitimate ads.

Malvertising is a particularly dangerous form of ransomware attack, as it can spread quickly and without the user’s knowledge.

Malvertising, phishing and social engineering is how ransomware spreads. Last year was the worst year for ransomware attacks statistically and information security analysts believe 2023 is expected to be worse.

To protect against ransomware, you must do some of the same things to prevent against other attacks. However having data duplication where your most important data is backed up and you know how to recover it is advised. This is getting easier to do with the number of cloud services available to consumers and the improvement of cloud security by these providers.

Future Cybersecurity Threats Consumers are Facing

Notorious hacker Marcel Lazar Lehel AKA Guccifer after his arrest in Romania in 2014.

Notorious hacker Marcel Lazar Lehel AKA Guccifer after his arrest in Romania in 2014, Source: Reuters

Cyber theft is already a major problem and it’s only getting worse. Cybercriminals are constantly changing the ways they target businesses, steal from individuals and attack security systems.

The rapid pace of technological change has created opportunities for cyber criminals to exploit new vulnerabilities, and many organizations are struggling to keep up. The most vulnerable sectors tend to be those that rely on legacy systems, lack robust network security or are unprepared for the latest cyber threats.

6. The future of cybersecurity is good AI versus bad AI.

HAL 9000 from the 1968 film 2001: A Space Odyssey

HAL 9000 from the 1968 film 2001: A Space Odyssey

Artificial Intelligence (AI) can be used in many different areas such as robotics, image recognition, natural language processing, and automated decision making.

  • Artificial intelligence (AI) is the ability of a computer or a machine to think, reason, and learn. 

AI is an area of computer science that focuses on the development of algorithms and systems that can learn from data, recognize patterns, and make decisions with minimal human intervention.

Cyber criminals may use AI to automate cyber attacks and make them more difficult to detect. For example, they may use AI to generate malicious code that can bypass traditional security measures, launch sophisticated phishing campaigns, or brute force break into systems.

AI can also be used to detect vulnerabilities in systems and launch targeted attacks. Additionally, AI can be used to analyze large amounts of data to identify patterns and discover new attack vectors.

7. Quantum supremacy will transform cybersecurity by breaking all current encryption protocols.

IBM's Osprey Quantum Computer.

IBM’s Osprey Quantum Computer. Source: IBM

Quantum computers will be able to solve problems in seconds that today would take traditional computers thousands of years.

Instead of bits that are either 1 or 0 (on or off), quantum computers use qubits that can be in a state called superposition.

  • Superposition is a state where qubits are both on and off at the same time, or somewhere on a spectrum between the two.

Quantum computers will also be able to do a thing called entanglement.

  • Entanglement is the linking together of two particles, even if they’re physically separate.

This might sound like magic but managing superposition and entanglement will allow us to build better batteries, reduce traffic in our cities, design new cures for deadly diseases or break all the encryption that is used today to protect sensitive data.

If the world fails to deploy quantum-resistant encryption the impacts to communications systems, financial information and government secrets could be catastrophic, leading to a loss of privacy and security breaches on a global scale.

8. Our surface area of attack is growing because of the Internet-of-Things.

Examples of "Smart," connected devices

Examples of “Smart,” connected devices, Source: The Ambient

As our world becomes increasingly interconnected, the risks to our personal data and digital lives continue to grow as we rely on technology for everything from online shopping to controlling our home appliances and other connected devices through the Internet-of-Things.

  • The Internet of Things (IoT) refers to the interconnection of physical devices, systems, and services via the internet.

The more devices we have that are connected to the Internet the greater our digital footprint becomes. A larger digital footprint means more things for cybercriminals to attack.

While IoT has the potential to bring many benefits to our lives, it also comes with several cybersecurity risks like:

  • Lack of security by design – Many IoT devices are designed without built-in or network security measures, meaning they are vulnerable to hacking.
  • Data leakage – Many IoT devices collect and store data, which can include sensitive information such as health records or financial data. If this data is not properly secured, it could be accessed by unauthorized individuals.
  • Botnets – IoT devices are an attractive target for botnet operators, who can use them to carry out nefarious activities like DDoS attacks, which is like a giant flood of data that can take down a website or network. A botnet is a network of computers used by cyber criminals to send this massive amount of data that overloads the server or network, making it too slow or even completely unavailable.
  • Lack of regulation – Currently, there are few regulations or standards specifically for IoT security, which means that manufacturers are not held accountable for the security of their devices. This has led to a “wild west” environment where security is often an afterthought.

9. Critical Infrastructure security will be increasingly at risk, causing digital attacks to have more impact on the physical world.

The Bruce T. Haddock Water Treatment Plant in Oldsmar, Florida

The Bruce T. Haddock Water Treatment Plant in Oldsmar, Florida, Source: Chris Urso, Tampa Bay Times

Critical infrastructure, such as water systems, energy companies, electrical grids, and transportation networks, are increasingly becoming targets of cyber attacks. In the past few years, there have been numerous cyber attacks highlighting the vulnerability of critical infrastructure, including:

  • The NotPetya computer virus spread across the computer networks of more than 60 countries in June 2017. This Russia cyber attack, specifically conducted by the Russian military, exploited a vulnerability in the Microsoft Windows operating system to cause an estimated $10 billion in disruption and destruction to banks, airports, power plants, transportation companies and governments.
  • The Oldsmar, Florida Water Treatment Plant cyber breach took place in February 2021 when a hacker using stolen credentials gained remote access to the city’s water treatment plant and attempted to poison the city’s water supply by increasing the chemicals in the water to a deadly level.
  • The Colonial Pipeline ransomware attack in May 2021 resulted in the shutdown of the largest fuel pipeline in the United States, which delivers 45 percent of the fuel for the East Coast. The attack was not carried out by a nation state to disrupt the economy but by a criminal group to hold corporate data for ransom. It had a significant impact on fuel supply and prices.

Consumers should be concerned about these attacks because they can have a significant impact on the availability and reliability of essential digital services AND physical services as well. The Oldsmar Water Treatment Plant cyber attack is an example of how terrorists could resort to cyberterrorism to achieve their aims.  

Taking Measures to Reducing the Severity, Seriousness, and Painfulness of Cyber Attacks

As we enter the new year, ransomware infection is becoming more prevalent, and phishing scams are becoming more sophisticated. There is also the growing threat of cyber warfare and state-sponsored attacks from Russian and China, which could target critical infrastructure. Individuals can only do so much to protect themselves from cyber attacks. Businesses, industries and governments need to do more to create a better environment for consumers to live their digital lives. 

10. Standardize cybersecurity protocols across industries.

Future home of CISA

Future home of CISA, Source: Department of Homeland Security

As one of the newest federal agencies, established in 2018 CISA has been leading a national effort to protect the nation’s critical infrastructure from physical and cyber threats. Companies and other cybersecurity leaders are working to secure consumer data by implementing stronger security measures and educating users on best practices.

There is an opportunity for standardization in cybersecurity policies and protocols through joint efforts from industry and government.

  • Cybersecurity policies and protocols are plans, rules, actions, and measures to use to ensure your company’s protection against any breach, attack, or incident that may occur. Data has become some companies most valuable assets, so ensuring the protection of your data has become more vital than it ever has been.

Standardized cybersecurity protocols would allow for a common set of best practices to be shared across different sectors and could help reduce the number of attacks. Something as simple as coordinating cybersecurity polices and protocols is one way America will improve its cybersecurity. 

11. Hit our enemies, establish norms with our friends, pressure everyone else.

Canals of Bruges, Belgium: According to UNCTAD, Belgium doesn't have a cybercrime legislation

Canals of Bruges, Belgium: According to UNCTAD, Belgium doesn’t have a cybercrime legislation

Over the years cybersecurity policy of the United States has failed to do three things:

  1. Encourage all governments to adopt laws making cyber attacks illegal or constraining the ability of cyber criminals to operate within all jurisdictions.
  2. Convince adversarial governments to accept norms around cybersecurity and cyber war.
  3. Impose sufficient costs on attackers to make them think twice before perpetuating an attack.

Nation-states need to be held accountable for malicious cyber activity emanating from their territory. This is the only way they will develop the legal and technical capabilities to improve poor cyber security procedures making the rest of the world more vulnerable.

Norms are more useful in binding friends together than in constraining adversaries. The United States should work with allies to agree on norms necessary to prevent catastrophic outcomes like destructive cyber attacks on election and financial systems. We should also develop joint practices for handling zero-day vulnerabilities (flaws in software not known to the public) and improve transparency between allies about cyber operations.

Cyber criminals need to think twice before they execute an attack. The only way this happens is if they think the consequences of their actions are going to be greater than whatever booty they gain. When responding to cyber attacks the US government and our allies have to be willing to use more than just digital tools to respond. We should be prepared to make the digital infrastructure used in the attacks inoperable and use tools in the physical world like sanctions, arrests and seizure of assets.

12. Achieve good digital hygiene.

Hand Washing Image

We relearned a lot about personal hygiene during the pandemic. To reduce our chances of getting COVID-19—wash hands, wear a face mask, and practice social distancing. For our online lives, there is digital hygiene.

Good digital hygiene is all about having a personal cyber security risk management plan that makes sure you are deploying best practices to keep yourself safe online. The basics of good digital hygiene or a personal cyber security risk management plan have four elements:

  1. Password Protection – have a unique fourteen-character-plus password for every system that requires a password.
  2. Patch Promptly – keep your software on your phone or laptop up to date in order to protect your devices against a vulnerability discovered by the company that wrote the software.
  3. Phishing Prevention – resist clicking on attachments in your email or texts from someone you don’t know.
  4. Data Duplication – establish a data backup and recovery plan for your most important data to be prepared in the event of a ransomware infection.

Just like good personal hygiene can prevent you from getting sick. Good digital hygiene helps to ensure the security and privacy of your digital information and data.


Cybersecurity is important because it is necessary for us to have a safe, productive, and fun digital life. The current state of cybersecurity is one of constant vigilance. Cyber security threats to consumers continue to evolve but following the 6Ps and 2Ds of digital hygiene will protect you from a majority of cybersecurity threats.

First time reading? If you want rational takes on foreign policy, politics and technology then sign up below or click here for “The Brief.” It’s a twice-a-month email on things that aren’t being discussed but should – all in 5 minutes or less.

American Reboot

An Idealist's Guide to Getting Big Things Done

Star Rating Star Rating
4.5 out of 5 Based on 132 reviews

About the book

Will draws on his unique experiences in back alleys of dangerous places, boardrooms of international businesses, and the halls of Congress to lay out a detailed plan to “reboot America,” offering a fresh start to a country mired in political divides and internal strife.

Mike Yantis, Jr.
Star Rating Star Rating
Verified Purchase

Will Hurd tells a great story about his life and his experiences in the CIA, private business, and as a Congressman.

The book also serves as a playbook for like minded Republicans that want to transform the party from the extremes of Trump back to a solutions based party that actually gets things done.

Star Rating Star Rating
Verified Purchase

This is one of the best books I have ever read. Part personal story, part political analysis, but mainly just common sense thinking and analysis of solutions to problems.

Will Hurd is an amazing writer and person and I expect to see him do great things in the future.

Star Rating Star Rating
Verified Purchase

This was a great read. As someone who tends to identify as an Independent or moderate, I thought Mr. Hurd made some great points and offered thoughtful solutions.

I hope he considers a run for political office again, I'd vote for him in a heartbeat.

Star Rating Star Rating
Verified Purchase

A life long Republican I had lost hope that I would ever vote Republican again after the extremist views have taken over the party over the last 6 years.

This book covered all my values & concerns in a nuanced way that the majority of politicians today seem incapable of doing.

Hurd has the biography and the charisma and the God-given political chops to put the Republican Party — and the rest of the country — on notice.
The Atlantic
Fox News Logo
The Wall Streel Journal Logo
CNN Logo
CBS News Logo
ABC News Logo
USA Today Logo
Quote Mark
America has become an exceptional nation not because of what we have taken but because of what we have given.

Will Hurd

Will Hurd Image
Play video
June 18, 2023
New Cold War Between U.S. and China Explained
Will's op-ed in the The NH Journal about migration and border control.
Close video popup

About Will

Will Hurd has spent the past 20 years on the front lines of the most pressing fights facing our nation, in the Middle East, Congress, and the highest levels of business and tech.

Will has spent his life fighting for our country, and he will take those decades of experience with him as he fights for all us.

Quote Mark
I dream of an America where we have the smartest kids in the world. Every child in the U.S., regardless of location or age, should have access to a safe, world-class education.


The choice we face

In every decision we make, we stand at a crossroads. The path of division and quick fixes is well-trodden, but it’s time we consider a different route – one paved with unity and foresight.

Imagine an America where common sense prevails, where policies are crafted with the people’s best interests at heart, and our collective strengths are the foundation of national progress.

This is more than a possibility. It’s a choice we can make right now. By coming together, we have the power to foster a nation that champions innovation, inclusivity, and integrity.

What do we agree on?

Believe it’s important to protect free speech
Believe college education is important for success
Support the development of alternative energy sources
Believe it is essential to maintain Social Security
Support background checks for all gun buyers
Believe that LGBTQ+ individuals should have equal rights
Say it is important for the country to do more regarding race inequality
Are unhappy with the current US economy
Believe the federal government doesn't share enough information
Are concerned about pollution of drinking water
Believe the nation's infrastructure is in need of major repairs
Believe that access to affordable housing is a problem
Politico Magazine

The future of the GOP

Daily Dot

The most interesting man in Congress

Allegheny College

Prize for Civility in Public Life


Blocked by the most Chinese Diplomats


Sanctioned by Vladimir Putin

Hear from People

What’s a modern republican look like?

We’re a nation full of people with these values. If this describes you, you might be a modern Republican.

Respectful and Polite

Strong old school manners. You respect others, and say "please" and "thank you"


You give someone a fair shot


You're ready to put yourself in the shoes of someone else.


No matter street smarts or book smarts, you understand an education is important

Family Values

You put your family above everything and do everything you can to succeed


You take responsibility for your actions and believe in personal responsibility


You help others and you're always quick to smile


You don't let a little hardship get in your way


You know that we're better together and you are ready to help
AI Summary