Computer Security, Internet security, Cybersecurity, Web filtering, IT Protection

Computer security, also known as cybersecurity, is the protection of computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. IT Reseller news and articles relating to Computer Security, Internet security, Web filtering, Virus protection, Firewall, Encryption, Network Security, Anti-Virus Software, Security Architecture, Platform Security, Computer Viruses, Spyware, Phishing & Spam protection.

RSS

Securing manufacturing's digital future: The importance of end-to-end encryption

1 Securing manufacturing's digital future: The importance of end-to-end encryption

The digital transformation of manufacturing is becoming increasingly vital to the industry's success. As more companies adopt new technologies to improve both efficiency and productivity, and reduce costs, the drive towards a more digital future is gaining momentum.

Ethos Broking teams up with KYND to drive risk intelligence-led cyber insurance sales

2 Ethos Broking teams up with KYND to drive risk intelligence-led cyber insurance sales

KYND Limited, the provider of next-generation cyber risk management technology, has partnered with Ethos Broking, a UK-based collection of community brokers and part of the wider Ardonagh Group.

IoT And The Rise Of Security Breaches In The Retail Industry

3 IoT And The Rise Of Security Breaches In The Retail Industry

By James Cavendish, freelance writer.

There was a 26% rise in organised crime targeted at retail stores in 2021, and according to a recent survey, the cost of living crisis has caused 89% of people to believe that theft crimes will rise. Security breaches are undoubtedly rising in the retail industry. But how is the retail sector responding?

Halo helps protect the public during ‘Operation Golden Orb’

4 Halo helps protect the public during ‘Operation Golden Orb’

Halo Solutions, the British tech company behind intelligent incident and threat management software platform Halo (v5), played an important supporting role in keeping the public safe during ‘Operation Golden Orb’, the counterterrorism and security plan devised by the Metropolitan Police for the Coronation of King Charles III and the Coronation concert at Windsor Castle.

EasyDMARC partners with Topsec Cloud Solutions to strengthen email cybersecurity with essential DMARC services

5 EasyDMARC partners with Topsec Cloud Solutions to strengthen email cybersecurity with essential DMARC services

EasyDMARC, the provider of user-friendly and cost-effective DMARC solutions, has announced its partnership with Topsec Cloud Solutions, the provider of cloud-based managed email and web security solutions.

5 Important Security Technologies That Every HR Professional Should Know and Use

6 5 Important Security Technologies That Every HR Professional Should Know and Use

By James Cavendish, freelance writer.

Most businesses treat and conceive of HR and security as separate entities, however, HR professionals can improve their own productivity and even increase employee engagement by leveraging security technologies to automate daily tasks and improve overall data accuracy.

More than half of UK businesses impacted by supply chain cyber breaches

7 More than half of UK businesses impacted by supply chain cyber breaches

More than half (57%) of UK businesses have been impacted because of a cyber security/information security incident caused by a third-party vendor or supply chain partner, according to new research published by ISMS.online.

Logpoint appoints new Regional Director for CEMA and adds seasoned cybersecurity executive to the board

8

LogPoint has announced Sven Bagemihl as Regional Director for the CEMEA region, including Germany, Switzerland, and Austria.

The psychological impact of phishing attacks on your employees

9 The psychological impact of phishing attacks on your employees

By Jack Chapman, VP of Threat Intelligence, Egress.

As we observe Stress Awareness Month, it's important to recognize the toll that phishing attacks can take on individuals and organizations. These attacks have become increasingly sophisticated and widespread, with a staggering 92% of organizations falling victim to successful phishing attacks in the last 12 months.

Lexmark named a Leader in Security Solutions and Services Hardcopy by IDC MarketScape

10 Lexmark named a Leader in Security Solutions and Services Hardcopy by IDC MarketScape

Lexmark, a global imaging and IoT solutions leader, has again been recognised as a Leader in the IDC MarketScape: Worldwide Security Solutions and Services Hardcopy 2022-23 Vendor Assessment.

Computer Security

Computer security is the protection of computer systems and information from unauthorized access, use, disclosure, disruption, modification, or destruction. It is a broad field that encompasses a wide range of topics, including:

  • Network security: This is the protection of computer networks from unauthorized access or attack. It includes things like firewalls, intrusion detection systems, and security policies.
  • Application security: This is the protection of software applications from vulnerabilities that could be exploited by attackers. It includes things like code review, penetration testing, and security testing.
  • Data security: This is the protection of sensitive data from unauthorized access, use, disclosure, or destruction. It includes things like encryption, access control, and data backups.
  • Operational security: This is the protection of computer systems from threats that arise from human error or negligence. It includes things like user training, incident response procedures, and security awareness.

Cybersecurity

Cyber security is the practice of protecting computer systems and networks from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users via ransomware; or interrupting normal business processes.

There are many different types of cyber security threats, but some of the most common include:

  • Malware: Malware is software that is designed to harm a computer system. Malware can take many forms, including viruses, worms, trojans, and ransomware.
  • Phishing: Phishing is a type of social engineering attack that involves sending emails or text messages that appear to be from a legitimate source. The goal of phishing is to trick the recipient into clicking on a malicious link or providing personal information.
  • Data breaches: A data breach is an incident in which sensitive data is exposed to unauthorized individuals. Data breaches can occur due to a variety of factors, including hacking, human error, and system vulnerabilities.

Cyber security is a critical issue for businesses of all sizes. In today's digital world, businesses rely on their computer systems and networks to operate. A cyber attack can have a devastating impact on a business, including financial losses, reputational damage, and loss of customer trust.

Cyber security is an ongoing challenge, but by taking steps to protect themselves, businesses can help to mitigate the risks of cyber attacks.

Editorial: +44 (0)1892 536363
Publisher: +44 (0)208 440 0372
Subscribe FREE to the weekly E-newsletter