Computer Security, Internet security, Cybersecurity, Web filtering, IT Protection

Computer security, also known as cybersecurity, is the protection of computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. IT Reseller news and articles relating to Computer Security, Internet security, Web filtering, Virus protection, Firewall, Encryption, Network Security, Anti-Virus Software, Security Architecture, Platform Security, Computer Viruses, Spyware, Phishing & Spam protection.

RSS

Frost & Sullivan recognises perception as most innovative new cyber security software

1 Frost & Sullivan recognises perception as most innovative new cyber security software

Frost & Sullivan has recognised Perception Cyber Security with its 2017 New Product Innovation Award, describing it as a "game-changing cyber security solution."

New report: UK’s security at risk due to increasing reliance on digital technology

2 New report: UK’s security at risk due to increasing reliance on digital technology

The UK needs to build new levels of resilience and reliability into its electricity networks, including protection against hackers, to support the country's increasingly digital infrastructure, according to a new report by the Institution of Mechanical Engineers.

Enterprises are losing by default to cyber criminals

3 Enterprises are losing by default to cyber criminals

By Alastair Hartrup, global CEO of Network Critical.

In sports if one team does not have enough players to field a team they lose by default. This is the easiest way to win for the victorious party. Not a drop of sweat was produced and there was no risk of injury or embarrassment. The only thing the victors had to do was show up and they get to take home the trophy.

Three pressing cyber threats for IoT in 2018

4 Three pressing cyber threats for IoT in 2018

By Kristofer Mansson, CEO of Silobreaker.

Every year we see new pressing cyber threats, from new targets for hackers to new issues cropping up in the cybersecurity space. 2018 will be no different.

Over a third of small businesses have not yet started preparing for the introduction of the General Data Protection Regulation – FSB research

5 Over a third of small businesses have not yet started preparing for the introduction of the General Data Protection Regulation – FSB research

Federation of Small Businesses (FSB) research shows that over a third (33%) of small businesses have not yet started preparing for the introduction of the General Data Protection Regulation (GDPR) while a further third (35%) are only in the early stages of preparations.

Cybersecurity threat to renewable energy infrastructure

6 Cybersecurity threat to renewable energy infrastructure

Renewable energy technologies have established a significant role in the energy industry. Because of their prominence and growing importance to power supplies, it is vital for the industry to develop appropriate security, and specifically cybersecurity, strategies.

Axis launches new software for easy on-site device management and proactive cybersecurity control

7 Axis launches new software for easy on-site device management and proactive cybersecurity control

Axis Communications has announced the release of AXIS Device Manager, a comprehensive on-premise device management tool that offers an easy, cost-effective and secure way to manage all major installation and operational device management tasks.

Half of SMEs fear financial loss from poor IT security and data compliance

8 Half of SMEs fear financial loss from poor IT security and data compliance

Recent research by Ultima, the provider of on-premise and cloud IT infrastructure and managed service solutions, has found that over half (58%) of the UK's SMEs think their businesses are at risk of financial loss from poor IT security and data compliance, with 67% believing they may be out of business in three years if their IT security and compliance doesn't improve.

Frequency and complexity of DDoS attacks is rising

9 Frequency and complexity of DDoS attacks is rising

Netscout Systems has released its 13th Annual Arbor Worldwide Infrastructure Security Report (WISR) offering direct insights from network and security professionals at the world's leading service provider, cloud/hosting and enterprise organisations.

Lanner's HybridTCA platform HTCA-6200 now validated for Wind River Titanium Cloud for the acceleration of carrier-grade NFV solutions

10 Lanner's HybridTCA platform HTCA-6200 now validated for Wind River Titanium Cloud for the acceleration of carrier-grade NFV solutions

Lanner Electronics, Inc. has announced that its NFVi-ready appliance HTCA-6200 is now validated with the Wind River Titanium Cloud portfolio of virtualisation software platforms, offering the high-performance telco hardware and software platform demanded by carrier-grade NFV applications.

Computer Security

Computer security is the protection of computer systems and information from unauthorized access, use, disclosure, disruption, modification, or destruction. It is a broad field that encompasses a wide range of topics, including:

  • Network security: This is the protection of computer networks from unauthorized access or attack. It includes things like firewalls, intrusion detection systems, and security policies.
  • Application security: This is the protection of software applications from vulnerabilities that could be exploited by attackers. It includes things like code review, penetration testing, and security testing.
  • Data security: This is the protection of sensitive data from unauthorized access, use, disclosure, or destruction. It includes things like encryption, access control, and data backups.
  • Operational security: This is the protection of computer systems from threats that arise from human error or negligence. It includes things like user training, incident response procedures, and security awareness.

Cybersecurity

Cyber security is the practice of protecting computer systems and networks from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users via ransomware; or interrupting normal business processes.

There are many different types of cyber security threats, but some of the most common include:

  • Malware: Malware is software that is designed to harm a computer system. Malware can take many forms, including viruses, worms, trojans, and ransomware.
  • Phishing: Phishing is a type of social engineering attack that involves sending emails or text messages that appear to be from a legitimate source. The goal of phishing is to trick the recipient into clicking on a malicious link or providing personal information.
  • Data breaches: A data breach is an incident in which sensitive data is exposed to unauthorized individuals. Data breaches can occur due to a variety of factors, including hacking, human error, and system vulnerabilities.

Cyber security is a critical issue for businesses of all sizes. In today's digital world, businesses rely on their computer systems and networks to operate. A cyber attack can have a devastating impact on a business, including financial losses, reputational damage, and loss of customer trust.

Cyber security is an ongoing challenge, but by taking steps to protect themselves, businesses can help to mitigate the risks of cyber attacks.

Editorial: +44 (0)1892 536363
Publisher: +44 (0)208 440 0372
Subscribe FREE to the weekly E-newsletter