Computer Security, Internet security, Cybersecurity, Web filtering, IT Protection

Computer security, also known as cybersecurity, is the protection of computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. IT Reseller news and articles relating to Computer Security, Internet security, Web filtering, Virus protection, Firewall, Encryption, Network Security, Anti-Virus Software, Security Architecture, Platform Security, Computer Viruses, Spyware, Phishing & Spam protection.

RSS

Security for intent-based networking

1 Security for intent-based networking

By Ronald Sens, EMEA Director, A10 Networks

Networks have become more massive and complex than ever before. This year at Cisco Live US, people were talking about managing and defending networks at scale.

Retailers must beat off hackers to safeguard their businesses

2 Retailers must beat off hackers to safeguard their businesses

Retailers who install Wi-Fi networks to connect in-store POS and staff devices, as well as provide free Wi-Fi to customers, are increasingly vulnerable to cyberattacks that could impact their businesses, says Vodat International, the network security provider to the retail industry.

Stronger and more frequent brute force attacks are now the norm

3 Stronger and more frequent brute force attacks are now the norm

The number and intensity of brute force attacks – such as those which targeted the UK and Scottish Parliaments last year – has increased dramatically over the first half of this year, according to new research from leading cyber security specialist Foregenix.

EACS continues its expansion with acquisition of disaster recovery, IT and managed services specialists, Sentronex

4 EACS continues its expansion with acquisition of disaster recovery, IT and managed services specialists, Sentronex

Managed services provider EACS has acquired the privately held IT services company Sentronex.

SolarWinds MSP enhances risk intelligence with expanded data breach risk scan

5 SolarWinds MSP enhances risk intelligence with expanded data breach risk scan

SolarWinds MSP has enhanced its SolarWinds Risk Intelligence offering with an Expanded Data Breach Risk Scan (ExDBRS), helping users better discover and identify risks from security vulnerabilities stored on endpoint devices, and enhancing regulatory compliance capabilities.

Hollis Technology joins Dell EMC Select Partner Programme

6 Hollis Technology joins Dell EMC Select Partner Programme

Hollis Technology, the UK provider of business support solutions, has signed a definitive reseller agreement with Dell EMC establishing the company as an Authorised Solution Provider within Dell EMC's Select Partner Programme.

FICO survey: UK firms are too confident about their cybersecurity

7 FICO survey: UK firms are too confident about their cybersecurity

Despite the growth in data breaches, senior executives at UK firms think their cybersecurity protection is top-notch, according to a new survey conducted by research and consultancy firm Ovum for Silicon Valley analytics firm FICO.

When the path to destruction has a happy ending…

8 When the path to destruction has a happy ending…

By David Fathers, Regional General Manager at Crown Records Management.

Weak passwords are behind the success of cyber crimes

9 Weak passwords are behind the success of cyber crimes

Ahead of the findings published by the City of London Police which reveals that cyber crime victims lost £28m between October 2017 and March 2018, Martin Tyley, cyber security lead at KPMG in the UK, highlights passwords are key to the success of these cyber crimes.

Malicious cryptocurrency miners gaining momentum

10 Malicious cryptocurrency miners gaining momentum

WatchGuard Technologies' latest Internet Security Report reveals that 98.8 percent of seemingly common Linux/Downloader malware variants in Q1 2018 were actually designed to deliver a popular Linux-based cryptocurrency miner.

Computer Security

Computer security is the protection of computer systems and information from unauthorized access, use, disclosure, disruption, modification, or destruction. It is a broad field that encompasses a wide range of topics, including:

  • Network security: This is the protection of computer networks from unauthorized access or attack. It includes things like firewalls, intrusion detection systems, and security policies.
  • Application security: This is the protection of software applications from vulnerabilities that could be exploited by attackers. It includes things like code review, penetration testing, and security testing.
  • Data security: This is the protection of sensitive data from unauthorized access, use, disclosure, or destruction. It includes things like encryption, access control, and data backups.
  • Operational security: This is the protection of computer systems from threats that arise from human error or negligence. It includes things like user training, incident response procedures, and security awareness.

Cybersecurity

Cyber security is the practice of protecting computer systems and networks from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users via ransomware; or interrupting normal business processes.

There are many different types of cyber security threats, but some of the most common include:

  • Malware: Malware is software that is designed to harm a computer system. Malware can take many forms, including viruses, worms, trojans, and ransomware.
  • Phishing: Phishing is a type of social engineering attack that involves sending emails or text messages that appear to be from a legitimate source. The goal of phishing is to trick the recipient into clicking on a malicious link or providing personal information.
  • Data breaches: A data breach is an incident in which sensitive data is exposed to unauthorized individuals. Data breaches can occur due to a variety of factors, including hacking, human error, and system vulnerabilities.

Cyber security is a critical issue for businesses of all sizes. In today's digital world, businesses rely on their computer systems and networks to operate. A cyber attack can have a devastating impact on a business, including financial losses, reputational damage, and loss of customer trust.

Cyber security is an ongoing challenge, but by taking steps to protect themselves, businesses can help to mitigate the risks of cyber attacks.

Editorial: +44 (0)1892 536363
Publisher: +44 (0)208 440 0372
Subscribe FREE to the weekly E-newsletter