Computer Security, Internet security, Cybersecurity, Web filtering, IT Protection

Computer security, also known as cybersecurity, is the protection of computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. IT Reseller news and articles relating to Computer Security, Internet security, Web filtering, Virus protection, Firewall, Encryption, Network Security, Anti-Virus Software, Security Architecture, Platform Security, Computer Viruses, Spyware, Phishing & Spam protection.

RSS

Cloud Distribution partners with CybSafe to disrupt cyber security awareness market

1 Cloud Distribution partners with CybSafe to disrupt cyber security awareness market

Cloud Distribution, the 'Cloud First' value-added distributor specialising in cyber security, networking and datacentre solutions, has partnered with CybSafe, the cloud-based cyber security awareness platform combining AI and data analytics with behavioural science.

Bromium introduces Protected App

2 Bromium introduces Protected App

Bromium, Inc. has announced the release of Protected App, which allows organisations to establish robust, end-to-end protection around their critical IP and high-value assets (HVA).

Tech Data Live 2018 channel event will bring resellers up to speed

3 Tech Data Live 2018 channel event will bring resellers up to speed

Tech Data is staging a major channel event in September, giving resellers the chance to get up to speed on new and emerging trends and technologies and the opportunities they present whilst networking with leading vendors, reseller peers and Tech Data's own teams.

ForeScout and Carbon Black integrate to reduce business impact of cyber threats

4 ForeScout and Carbon Black integrate to reduce business impact of cyber threats

ForeScout Technologies, Inc., the internet of things (IoT) security company, and Carbon Black, the next-generation endpoint security solutions provider, have announced a new integration to fortify endpoint defences and accelerate threat containment across enterprise networks.

Netscout teams up with IBM for data-driven transformation

5 Netscout teams up with IBM for data-driven transformation

Netscout Systems Inc., provider of service assurance, security, and business analytics, has announced a collaboration with IBM.

Supply chain attacks on the rise as one of the biggest new threat vectors as organisations scramble to close gaps

6 Supply chain attacks on the rise as one of the biggest new threat vectors as organisations scramble to close gaps

CrowdStrike Inc., the cloud-delivered endpoint protection solutions provider, has announced the results of its global supply chain survey, Securing the Supply Chain, produced by independent research firm Vanson Bourne.

Endpoints most vulnerable aspect of industrial IoT as SANS survey reveals confusion over industrial IoT security

7 Endpoints most vulnerable aspect of industrial IoT as SANS survey reveals confusion over industrial IoT security

Organisations hold disparate and unrealistic views on protecting the Industrial Internet of Things (IIoT), in which endpoints are considered to be the most vulnerable aspects, despite confusion over what actually constitutes an endpoint.

Security for intent-based networking

8 Security for intent-based networking

By Ronald Sens, EMEA Director, A10 Networks

Networks have become more massive and complex than ever before. This year at Cisco Live US, people were talking about managing and defending networks at scale.

Retailers must beat off hackers to safeguard their businesses

9 Retailers must beat off hackers to safeguard their businesses

Retailers who install Wi-Fi networks to connect in-store POS and staff devices, as well as provide free Wi-Fi to customers, are increasingly vulnerable to cyberattacks that could impact their businesses, says Vodat International, the network security provider to the retail industry.

Stronger and more frequent brute force attacks are now the norm

10 Stronger and more frequent brute force attacks are now the norm

The number and intensity of brute force attacks – such as those which targeted the UK and Scottish Parliaments last year – has increased dramatically over the first half of this year, according to new research from leading cyber security specialist Foregenix.

Computer Security

Computer security is the protection of computer systems and information from unauthorized access, use, disclosure, disruption, modification, or destruction. It is a broad field that encompasses a wide range of topics, including:

  • Network security: This is the protection of computer networks from unauthorized access or attack. It includes things like firewalls, intrusion detection systems, and security policies.
  • Application security: This is the protection of software applications from vulnerabilities that could be exploited by attackers. It includes things like code review, penetration testing, and security testing.
  • Data security: This is the protection of sensitive data from unauthorized access, use, disclosure, or destruction. It includes things like encryption, access control, and data backups.
  • Operational security: This is the protection of computer systems from threats that arise from human error or negligence. It includes things like user training, incident response procedures, and security awareness.

Cybersecurity

Cyber security is the practice of protecting computer systems and networks from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users via ransomware; or interrupting normal business processes.

There are many different types of cyber security threats, but some of the most common include:

  • Malware: Malware is software that is designed to harm a computer system. Malware can take many forms, including viruses, worms, trojans, and ransomware.
  • Phishing: Phishing is a type of social engineering attack that involves sending emails or text messages that appear to be from a legitimate source. The goal of phishing is to trick the recipient into clicking on a malicious link or providing personal information.
  • Data breaches: A data breach is an incident in which sensitive data is exposed to unauthorized individuals. Data breaches can occur due to a variety of factors, including hacking, human error, and system vulnerabilities.

Cyber security is a critical issue for businesses of all sizes. In today's digital world, businesses rely on their computer systems and networks to operate. A cyber attack can have a devastating impact on a business, including financial losses, reputational damage, and loss of customer trust.

Cyber security is an ongoing challenge, but by taking steps to protect themselves, businesses can help to mitigate the risks of cyber attacks.

Editorial: +44 (0)1892 536363
Publisher: +44 (0)208 440 0372
Subscribe FREE to the weekly E-newsletter