Information technologies are ubiquitous in the 21st century. Smart phones, tablets, and various other connected devices have, in only a few years, become fully integrated in our daily lives.
While all these new technologies have brought citizens of all nations important benefits and opportunities, they have also introduced new risks that need to be carefully managed. Computer viruses, ransomware, phishing, hacking, and identity theft are all examples of cybersecurity threats that can have disastrous and costly consequences.
All connected assets are at risk of being hacked. And, as the number and types of connected devices increases with time, so does the number of hackers and their skills at finding weaknesses in IT systems.