Computer Security, Internet security, Cybersecurity, Web filtering, IT Protection

Computer security, also known as cybersecurity, is the protection of computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. IT Reseller news and articles relating to Computer Security, Internet security, Web filtering, Virus protection, Firewall, Encryption, Network Security, Anti-Virus Software, Security Architecture, Platform Security, Computer Viruses, Spyware, Phishing & Spam protection.

RSS

Gartner survey shows information security governance practices are maturing

1 Gartner survey shows information security governance practices are maturing

Information security governance practices are maturing according to Gartner, Inc.'s annual end-user survey for privacy, IT risk management, information security, business continuity or regulatory compliance.

Fortinet closes acquisition of Meru Networks

2 Fortinet closes acquisition of Meru Networks

Fortinet, the high-performance cyber security solutions provider, has closed the acquisition of Meru Networks, the intelligent Wi-Fi networking solutions provider.

Private sector security specialists demand more threat intelligence sharing from UK government

3 Private sector security specialists demand more threat intelligence sharing from UK government

More than three quarters of IT security professionals (81%) believe the government should be sharing more threat intelligence information with the private sector, according to research conducted by Unified Security Management vendor AlienVault.

Varonis launches DatAnywhere 2.5 with enhancements to workflow and security

4 Varonis launches DatAnywhere 2.5 with enhancements to workflow and security

Varonis Systems, Inc. provider of software solutions for unstructured, human-generated enterprise data, has announced the general availability of version 2.5 of DatAnywhere, its popular secure file-sharing solution.

RES Software names Grace O’Rourke Veitch as Partner Director, EMEA

5 RES Software names Grace O’Rourke Veitch as Partner Director, EMEA

RES Software, the company in digital workspace technology, has announced that Grace O'Rourke Veitch has joined the company as Partner Director EMEA.

Pindrop Security reveals financial and retail institution call centres see 30 per cent rise in phone fraud

6 Pindrop Security reveals financial and retail institution call centres see 30 per cent rise in phone fraud

Pindrop Security, provider of call centre anti-fraud and authentication solutions for enterprise call centres, has announced the findings of its annual Phone Fraud Report. For the report, Pindrop analysed several million calls for threats using the company's patented Phoneprinting technology and Phoneypot monitoring technology. The research found a 30 per cent rise in enterprise attacks and more than 86.2 million attacks per month on U.S. consumers.

How to avoid ransomware attacks

7 How to avoid ransomware attacks

By Steve Harcourt, Senior Information Security Consultant, Redstor.

You may have heard about Ransomware attacks in the last few months. These are attacks that seize control of your machine or your data and demand a ransom to remove the virus.

Webroot introduces expanded threat intelligence solution for Splunk

8 Webroot introduces expanded threat intelligence solution for Splunk

Webroot has announced the expansion of its BrightCloud Threat Intelligence for Splunk product family with the introduction of the Webroot BrightCloud Threat Intelligence Add-on for Splunk.

Five steps to a safer security policy

9 Five steps to a safer security policy

A continuous flow of headline-making data breaches are forcing companies to take a new look at their security policies and make adjustments to keep up to date with the fast-moving threat landscape," says Alex Vovk, CEO and co-founder of Netwrix.

The keys to preserving information security and risk management

10 The keys to preserving information security and risk management

By Chris Sigley, General Manager of Redstor.

As the role of Information Technology continues to grow and evolve within business, the potential risks associated with accessing, storing, sharing and protecting information are similarly increasing.

Computer Security

Computer security is the protection of computer systems and information from unauthorized access, use, disclosure, disruption, modification, or destruction. It is a broad field that encompasses a wide range of topics, including:

  • Network security: This is the protection of computer networks from unauthorized access or attack. It includes things like firewalls, intrusion detection systems, and security policies.
  • Application security: This is the protection of software applications from vulnerabilities that could be exploited by attackers. It includes things like code review, penetration testing, and security testing.
  • Data security: This is the protection of sensitive data from unauthorized access, use, disclosure, or destruction. It includes things like encryption, access control, and data backups.
  • Operational security: This is the protection of computer systems from threats that arise from human error or negligence. It includes things like user training, incident response procedures, and security awareness.

Cybersecurity

Cyber security is the practice of protecting computer systems and networks from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users via ransomware; or interrupting normal business processes.

There are many different types of cyber security threats, but some of the most common include:

  • Malware: Malware is software that is designed to harm a computer system. Malware can take many forms, including viruses, worms, trojans, and ransomware.
  • Phishing: Phishing is a type of social engineering attack that involves sending emails or text messages that appear to be from a legitimate source. The goal of phishing is to trick the recipient into clicking on a malicious link or providing personal information.
  • Data breaches: A data breach is an incident in which sensitive data is exposed to unauthorized individuals. Data breaches can occur due to a variety of factors, including hacking, human error, and system vulnerabilities.

Cyber security is a critical issue for businesses of all sizes. In today's digital world, businesses rely on their computer systems and networks to operate. A cyber attack can have a devastating impact on a business, including financial losses, reputational damage, and loss of customer trust.

Cyber security is an ongoing challenge, but by taking steps to protect themselves, businesses can help to mitigate the risks of cyber attacks.

Editorial: +44 (0)1892 536363
Publisher: +44 (0)208 440 0372
Subscribe FREE to the weekly E-newsletter