Chapter 1: The Principles of Cybersecurity
A successful approach to cybersecurity is expressed in the form of multi-level protection covering computers, networks, programs, or data that need to be secured. Employees, workflows, and technologies must complement each other in organizations to provide adequate protection against cyber-attacks.
Employees
Users must understand and abide by the basic principles of information security, such as choosing strong passwords, attentiveness to email attachments, and backing up data, additional information on the basic principles of cybersecurity.
The processes
The organization should develop a set of necessary measures to counter ongoing and successfully carried out attacks. You can be guided by one reliable set of measures. This set of measures should explain how to identify attacks, protect systems, identify and counteract threats and restore functionality after an attack. 
Technology
Technology is an essential element in providing organizations and individuals with the tools they need to defend against cyber-attacks. The main components that need to be protected are terminal devices such as computers, smart devices, and routers; Networks and the cloud. The most common technologies used to protect these components include next-generation firewalls, DNS filtering, malware protection, antivirus software, and email protection solutions.
Why is cybersecurity so critical?  
In today's “connected” world, advanced cyber defense programs serve the benefit of every user. At an individual level, an attack with a hacked outcome or compromised defense can lead to a variety of consequences, from theft of personal information to extortion of money or the loss of valuable data, for example, family photos. The most important of all defenses are focused on critical infrastructures, such as power plants, hospitals, and financial services companies. The protection of these and other organizations is essential for maintaining the vital functions of our society.
Everyone benefits from cyberthreat research conducted by cyber threat experts, such as 250 Talos team members who are studying new and emerging threats, as well as cyber-attack strategies. They identify new vulnerabilities, inform the public about the importance of cyber security, and increase the reliability of open source tools. The work of these specialists makes the Internet more secure for each user.