Computer Security, Internet security, Cybersecurity, Web filtering, IT Protection

Computer security, also known as cybersecurity, is the protection of computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. IT Reseller news and articles relating to Computer Security, Internet security, Web filtering, Virus protection, Firewall, Encryption, Network Security, Anti-Virus Software, Security Architecture, Platform Security, Computer Viruses, Spyware, Phishing & Spam protection.

RSS

Webroot introduces expanded threat intelligence solution for Splunk

1 Webroot introduces expanded threat intelligence solution for Splunk

Webroot has announced the expansion of its BrightCloud Threat Intelligence for Splunk product family with the introduction of the Webroot BrightCloud Threat Intelligence Add-on for Splunk.

Five steps to a safer security policy

2 Five steps to a safer security policy

A continuous flow of headline-making data breaches are forcing companies to take a new look at their security policies and make adjustments to keep up to date with the fast-moving threat landscape," says Alex Vovk, CEO and co-founder of Netwrix.

The keys to preserving information security and risk management

3 The keys to preserving information security and risk management

By Chris Sigley, General Manager of Redstor.

As the role of Information Technology continues to grow and evolve within business, the potential risks associated with accessing, storing, sharing and protecting information are similarly increasing.

TDSi to introduce the benefits of its new MIFARE Plus and DESFire compatible readers at IFSEC International 2015

4 TDSi to introduce the benefits of its new MIFARE Plus and DESFire compatible readers at IFSEC International 2015

Integrated security manufacturer TDSi will be introducing the benefits of its new range of readers to visitors; on stand F1100 at IFSEC International 2015 (16 to 18 June, ExCel, London).

Radware launches new device fingerprinting technology to mitigate malicious bot attacks

5 Radware launches new device fingerprinting technology to mitigate malicious bot attacks

Radware, provider of cyber security and application delivery solutions ensuring optimal service level for applications in virtual, cloud and software defined data centres, has announced enhanced protection from threats posed by advanced bots through its Attack Mitigation System.

PhishMe unveils new security solution for real time visibility into targeted phishing attacks

6 PhishMe unveils new security solution for real time visibility into targeted phishing attacks

PhishMe Inc. has introduced PhishMe Triage into the UK market, a new product offering that gives incident responders the analytics and visibility into email-based attacks occurring against their organisations in near real-time.

Threat detection and remediation to emerge as a key market engine for managed security services

7 Threat detection and remediation to emerge as a key market engine for managed security services

The global managed security services (MSS) market is set to grow at lightning pace as the move to the cloud, bring-your-own-device (BYOD) trends, and new cybersecurity laws push organisations to improve their security posture. The emergence of sophisticated threats such as targeted attacks, advanced persistent threats, and larger distributed denial of service attacks too are leading enterprises to adopt a more mature approach to security, increasing the market opportunity for MSS providers (MSSPs).

20% of IT professionals have witnessed a security breach cover-up

8 20% of IT professionals have witnessed a security breach cover-up

Research conducted by AlienVault has shown that 20% of IT security professionals have witnessed a breach being hidden or covered up. The survey also found that in the event of a breach, only 25% of professionals would see the best course of action as telling the regulator and paying the fine.

Electronic security tag for protecting valuable shipments

9 Electronic security tag for protecting valuable shipments

In collaboration with its EU project partners, VTT has developed an electronic security tag, which can used to protect valuable shipments and enhance product safety in the future.

Wick Hill named distributor for Tenable Network Security

10 Wick Hill named distributor for Tenable Network Security

Recent security breaches in major organisations have highlighted the difficulties of protecting networks in an ever-changing dynamic IT landscape. While companies have invested in multiple, preventative security technologies such as authentication, anti-virus, automated patching, next generation firewalls and security event management, cyber criminals have taken advantage of blind spots that have increased as networks have become ever more complex and distributed.

Computer Security

Computer security is the protection of computer systems and information from unauthorized access, use, disclosure, disruption, modification, or destruction. It is a broad field that encompasses a wide range of topics, including:

  • Network security: This is the protection of computer networks from unauthorized access or attack. It includes things like firewalls, intrusion detection systems, and security policies.
  • Application security: This is the protection of software applications from vulnerabilities that could be exploited by attackers. It includes things like code review, penetration testing, and security testing.
  • Data security: This is the protection of sensitive data from unauthorized access, use, disclosure, or destruction. It includes things like encryption, access control, and data backups.
  • Operational security: This is the protection of computer systems from threats that arise from human error or negligence. It includes things like user training, incident response procedures, and security awareness.

Cybersecurity

Cyber security is the practice of protecting computer systems and networks from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users via ransomware; or interrupting normal business processes.

There are many different types of cyber security threats, but some of the most common include:

  • Malware: Malware is software that is designed to harm a computer system. Malware can take many forms, including viruses, worms, trojans, and ransomware.
  • Phishing: Phishing is a type of social engineering attack that involves sending emails or text messages that appear to be from a legitimate source. The goal of phishing is to trick the recipient into clicking on a malicious link or providing personal information.
  • Data breaches: A data breach is an incident in which sensitive data is exposed to unauthorized individuals. Data breaches can occur due to a variety of factors, including hacking, human error, and system vulnerabilities.

Cyber security is a critical issue for businesses of all sizes. In today's digital world, businesses rely on their computer systems and networks to operate. A cyber attack can have a devastating impact on a business, including financial losses, reputational damage, and loss of customer trust.

Cyber security is an ongoing challenge, but by taking steps to protect themselves, businesses can help to mitigate the risks of cyber attacks.

Editorial: +44 (0)1892 536363
Publisher: +44 (0)208 440 0372
Subscribe FREE to the weekly E-newsletter