{"id":180,"date":"2025-09-17T16:46:25","date_gmt":"2025-09-17T06:46:25","guid":{"rendered":"https:\/\/qld.cybersafebusiness.au\/index.php\/2025\/09\/17\/identifying-your-business-assets-confidentiality-integrity-availability\/"},"modified":"2025-09-17T16:46:25","modified_gmt":"2025-09-17T06:46:25","slug":"identifying-your-business-assets-confidentiality-integrity-availability","status":"publish","type":"post","link":"https:\/\/qld.cybersafebusiness.au\/index.php\/2025\/09\/17\/identifying-your-business-assets-confidentiality-integrity-availability\/","title":{"rendered":"Identifying your business assets (Confidentiality, Integrity, Availability)"},"content":{"rendered":"<p>Welcome back if you have been following our posts for cyber awareness month last month. If you are new to this post series, welcome and thank you for your support.<\/p>\n<p>As you probably realized, IT becomes integral to day-to-day operation of a business, the cost of failing to protect these systems becomes greater. All organizations operate within the limits of their resource constraints. <\/p>\n<p>You may ask, how an organization should allocate its limited resources to cybersecurity? The answer to this question is the allocation will depend to the organization\u2019s size and the nature of its business.<\/p>\n<p>The goal of cybersecurity is to protect Confidentiality, Integrity, and Availability or also refer as CIA triad of an organization\u2019s information system. <\/p>\n<p>Let\u2019s look at each of those words.<\/p>\n<p><b>Confidentiality<\/b><\/p>\n<p>refers to keeping<\/p>\n<p>sensitive information private and confidential. As you may be aware by now,<\/p>\n<p>information carries great value in the digital world, and organizations need to<\/p>\n<p>ensure sensitive data is protected and only accessible restrictively to<\/p>\n<p>essential individuals.<\/p>\n<p>\ud835\udddc\ud835\uddfb\ud835\ude01\ud835\uddf2\ud835\uddf4\ud835\uddff\ud835\uddf6\ud835\ude01\ud835\ude06 refers to the consistency of systems, networks, and data. They are maintained by preventing unauthorized or unintentional alterations and ensuring that the system or data being used as intended when accessed by a user. <\/p>\n<p>\ud835\uddd4\ud835\ude03\ud835\uddee\ud835\uddf6\ud835\uddf9\ud835\uddee\ud835\uddef\ud835\uddf6\ud835\uddf9\ud835\uddf6\ud835\ude01\ud835\ude06 refers to the availability of an information system if authorized users can freely access its systems, networks, or data.<\/p>\n<p>In conclusion, cyberattacks are designed to be invincible for as long as possible. The longer the actor has access to your information system, the further they can penetrate your networks and the more being stolen.<\/p>\n<p>We encourage you to conduct a simple check of your cybersecurity posture and this can be access on this link: https:\/\/cybersafebusiness.au\/csb-services\/being-cybersafe\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome back if you have been following our posts for cyber awareness month last month. If you are new to this post series, welcome and thank you for your support. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":179,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[],"tags":[],"class_list":["post-180","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/posts\/180","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/comments?post=180"}],"version-history":[{"count":0,"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/posts\/180\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/media\/179"}],"wp:attachment":[{"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/media?parent=180"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/categories?post=180"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/tags?post=180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}