Siirry sisältöön
Savelan vaakalogo white_2
  • NIS2 Directive
  • ServicesLaajenna
    • Firewall service
    • Substation consulting
    • SCADA consulting
    • Process network risk analysis
    • Information security audit of the production network
    • Communication solutions for the production network
    • Information security survey for the company
  • GuidesLaajenna
    • What is an OT network? A guide to the world of production networks!
    • What is information security? A guide to secure business!
  • Customer cases
  • Blog
  • About us
Give us a call
Savelan vaakalogo white_2
Cyber security

What is cyber security?

Information security consultantLauri Jurvanen Päivitetty4.6.2024
Cyber security, what is it and why should you care about cyber security - Save LAN production network expert

Cybersecurity protects us all against cyber threats. In this article, we take a closer look at the key themes of cybersecurity from different perspectives. For example, we look at how cybersecurity affects the daily lives of individuals, businesses and the wider Finnish and EU level. We dive into the topic to understand how we can work together to build a safer digital environment.

Definition of cyber security from Wikipedia

"Cybersecurity is a security domain that aims to ensure the safety of an electronic and networked society. Cybersecurity is the identification, prevention and preparedness for the impact of disruptions of electronic and networked systems on critical societal functions. Cybersecurity thinking combines the concepts of information security, continuity management and societal crisis preparedness."  Source: cybersecurity Wikipidea

Content of the article
  • Definition of cyber security from Wikipedia
  • From an individual perspective:
  • What about for the company:
  • For society as a whole:
  • Active threats:
  • Passive threats
  • Finland's cybersecurity strategy and its objectives
  • Key actors and organisations in Finland
  • Finnish legislation and documents related to cybersecurity
  • Specific challenges and achievements in cybersecurity in Finland
  • International cooperation on cybersecurity
  • Cybersecurity strategy
  • The NIS Directive and the Cybersecurity Regulation
  • Security of 5G networks
  • Cyber diplomacy

Why cybersecurity matters in 2023 and beyond?

From an individual perspective:

Cybersecurity is like everyone's personal shield in the digital world. It ensures that sensitive information, such as banking details and personal details, remains safe. Imagine if someone got hold of your personal data and misused it. Not only would that be scary, it could also lead to financial losses and identity theft.

What about for the company:

For businesses, cybersecurity is vital to protect their data, reputation and financial position. Cyber-attacks can lead to data leaks, loss of trade secrets, financial losses, etc. If a company is unable to protect its customers' data and experiences data leaks, its reputation will be severely damaged and this can lead to a loss of customer trust.

For society as a whole:

Cybersecurity protects critical infrastructures in our society, such as power grids, water supply and transport systems. Imagine if these systems were brought down by a cyber-attack. The consequences would be catastrophic and affect each and every one of us. We must always remember that cybersecurity is not just a matter for security experts, it affects us all and keeps the wheels of our society turning.

How is cybersecurity different from information security?

Cybersecurity and information security are terms that are often used as synonyms for each other, but have different priorities and scopes.

Cybersecurity focuses on protecting digital systems such as computers, smartphones and electronic networks. Cybersecurity is used to protect systems, networks and data from cyber-attacks, espionage and unauthorised access. It focuses more on external threats such as hacking and malware, but also on internal threats.

Information security, on the other hand, focuses on protecting information - whether it's in digital form or on your premises. The aim of information security is to protect data from unauthorised access, use, disclosure, interference, alteration or destruction. It covers both physical and digital security measures.

In summary: Cybersecurity is a broader concept than information security. Cybersecurity is broader than information security. Information security focuses primarily on protecting information, while cybersecurity focuses more broadly on protecting digital systems and networks.

Cyber threats

Cyber threats are digital threats to information systems, networks and the data stored on them. They can come from individual hackers, criminal organisations or even state actors. Cyber threats can be classified in many different ways, but one general classification is to distinguish between active and passive threats.

Active threats:

Active threats are proactive and offensive activities that actively seek to damage, disrupt or gain unauthorised access to information systems. The most common active threats are:

  • Malware threats: Such as viruses, worms, Trojans and ransomware. They can steal data, damage systems or prevent them from working.
  • Phishing attacks: Emails or messages that try to trick users into giving out their personal information or passwords.
  • DDoS attacks: Attacks that try to bring down online services by overloading them with traffic.
  • Zero day attacks: Attacks that exploit vulnerabilities that are not yet known to manufacturers or for which a fix is not yet available.

Passive threats

Unlike active threats, passive threats do not actively try to damage systems. Instead, they attempt to gather information without the target noticing. Examples of passive threats include:

  • Listening to online traffic: Attackers can "eavesdrop" on network traffic in an attempt to intercept data such as passwords or credit card details.
  • Man-in-the-middle attacks: An attacker stands between two parties and intercepts or modifies the communication between them.
  • Capturing cookies: Attackers can intercept browser cookies in an attempt to gain access to a user's online account.

How can you protect yourself against cyber threats?

Combating cyber threats requires both technical and organisational protection. Here are some ways to protect against these threats

Technical protection: Technical protection focuses on the software and hardware that protect information systems from cyber threats.

  1. Anti-virus software: Scan and remove malicious software from your computer.
  2. Firewalls or firewall services: Prevents unwanted connections and attacks.
  3. VPN connections: Remote VPN connection encrypts network traffic and protects privacy.
  4. Updates: Regular software and hardware updates fix known security vulnerabilities.
  5. Multi-step authentication: An extra layer protects your accounts from unauthorised access.

Organisational protection: Organisational protection focuses on the administrative measures and practices that protect an organisation from cyber threats.

  1. Education: Training staff to recognise and avoid cyber threats.
  2. Information security policies: Clear guidelines and protocols for maintaining security.
  3. Backups: Regular backups of important data prevent data loss.
  4. Access management: Ensure that only authorised persons have access to important information.
  5. Emergency management plan: Preparing for and responding to potential security breaches.

By combining technical and organisational defences, we can create a strong defence against cyber threats.

Challenges in cybersecurity

The challenges facing cybersecurity stem from the rapid evolution of technology and ever-changing threats. As cybercriminals develop new attack techniques, security solutions need to keep up with the times. However, the biggest challenge is often the human factor: user error and ignorance can open the door to cyber attacks.

Cybersecurity in Finland

Finland's cybersecurity strategy and its objectives

Finland's cybersecurity strategy focuses on strengthening national cybersecurity and ensuring society's resilience in the event of digital disruptions. The strategy aims to protect critical infrastructures, promote cooperation between the private and public sectors and increase citizens' awareness and skills in cybersecurity.

Key actors and organisations in Finland

There are many different organisations working on cybersecurity in Finland. Key players include Traficom Cybersecurity Centre, the Centre for Security of Supply and Police Cybercrime Centre. The Defence Forces are developing cybersecurity as part of the overall security of society In addition, private companies and research institutes are actively involved in developing cybersecurity and exploring ways to improve security.

Finnish legislation and documents related to cybersecurity

In Finnish legislation, cybersecurity relates in particular to Information Society Charter, the Data Protection Act and the Act on the Disclosure of Government Activities. These laws set out how information security and data protection should be handled and how public authorities should report cyber-attacks.

Specific challenges and achievements in cybersecurity in Finland

While Finland is a pioneer in many areas of cybersecurity, it also faces specific challenges, such as the rapidly changing cyber threat environment and resource constraints. However, Finland's achievements include the establishment of a National Cyber Security Centre and an active role in international cyber security cooperation networks.

The role of the European Union in cybersecurity

Cybersecurity EU - Save LAN production network expert

International cooperation on cybersecurity

The European Union works closely with Member States and other international actors, such as NATO, to improve cyber security. The EU aims to promote common standards, share best practices and coordinate Member States' efforts to combat cyber threats.

Cybersecurity strategy

The EU Cybersecurity Strategy sets out the Union's objectives and measures to strengthen cybersecurity. The strategy aims to protect the EU's digital single market, promote cooperation between Member States and strengthen the EU's role as a global player in cybersecurity.

The NIS Directive and the Cybersecurity Regulation

NIS Directive is the first EU legislation to focus on cybersecurity. It defines measures to protect critical infrastructure from cyber-attacks. The NIS Directive entered into force at EU level in 2016 and at national level in 2018.

The cybersecurity regulation, in turn, was the starting shot The EU cybersecurity agency ENISA and defines certification schemes for cybersecurity products and services.

Security of 5G networks

The EU has recognised the importance of 5G networks and the security risks associated with them. The Union has developed recommendations to Member States to ensure the security of 5G networks and is working to coordinate Member States' efforts to improve 5G security.

Cyber diplomacy

The EU uses diplomacy to promote cybersecurity globally. The Union works to strengthen international norms and rules in cyberspace, promote international cooperation online and fight cybercrime through diplomacy.

Conclusion on cybersecurity

Cybersecurity has become a central theme in the business world with digital transformation and the expansion of the internet. Businesses are no longer isolated islands, but part of a wider network that extends from individuals to critical societal infrastructures such as power grids, information systems and power plants. This networking has brought many benefits, but it has also opened the door to complex cyber threats. Knowledge of cyber security is vital to identify and counter these threats.

Businesses have a critical role to play in ensuring cyber security. A cyber breach is no longer just an internal problem; it can affect the entire supply chain, customers and even critical functions of society as a whole. Especially given the number of companies involved in maintaining and managing vital systems in our society, such as information systems and devices, it is clear that companies must take a leading role in cybersecurity. Proactive action and investment in cybersecurity is needed not only to protect their own business, but also to ensure that they can act as trusted actors in our digital society. In this way, companies can build trust with customers, partners and society.

Artikkelien selaus

Previous Previous
VPN connection for the company and especially to the production network
NextJatka
The most common cyber threats to companies

SERVICES

  • Firewall service-firewall-company-data network-Save-LAN-1

    Firewall service

    Secure your business network! Firewall Service Firewall Service is a service provided by Save LAN...

    Read more

  • Process network risk analysis Production network security prediction Save LAN Oy Lauri Jurvanen

    Process network risk analysis

    Make the production network safe! Process network risk analysis Process network risk analysis is a strategic tool that...

    Read more

  • What does technical security consist of Save LAN Lauri answers

    Information security audit of the production network

    Make the production network safe! Production Network Security Audit We have a long experience in secure processes....

    Read more

  • Electricity network substation consulting service Save LAN Oy

    Communication solutions for the production network

    Make the production network safe! Production network communication solutions Save LAN offers modern and secure communication solutions...

    Read more

  • Scada system consulting Save LAN Oy Lauri Jurvanen

    SCADA consulting

    Make the production network safe! SCADA consulting We offer you a high level of expertise and professionalism...

    Read more

  • Information security mapping for the company Lauri Jurvanen Save lan

    Information security survey for the company

    Ensuring the security of your business A security assessment for your business A security assessment will go through all the...

    Read more

Save LAN Oy

  • Rajatorpantie 8, 01600 Vantaa
  • 040 728 7636
  • Business ID: 3006557-7
  • lauri.jurvanen (at) savelan.fi

Services

  • Substation consulting
  • SCADA consulting
  • Process network risk analysis
  • Information security analysis of the production network
  • Communication solutions for the production network

Other links

  • A guide to secure business operations
  • Team
  • Give us a call
  • Register and Privacy Statement
Trusted-Partner-Save Lan logo
AA credit rating Savelan Oy

© 2026 Save LAN

en_USEnglish
fiFinnish en_USEnglish
We've detected you might be speaking a different language. Do you want to change to:
fi Finnish
fi Finnish
en_US English
Change Language
Close and do not switch language
  • NIS2 Directive
  • Services
    • Firewall service
    • Substation consulting
    • SCADA consulting
    • Process network risk analysis
    • Information security audit of the production network
    • Communication solutions for the production network
    • Information security survey for the company
  • Guides
    • What is an OT network? A guide to the world of production networks!
    • What is information security? A guide to secure business!
  • Customer cases
  • Blog
  • About us