Computer Security, Internet security, Cybersecurity, Web filtering, IT Protection

Computer security, also known as cybersecurity, is the protection of computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. IT Reseller news and articles relating to Computer Security, Internet security, Web filtering, Virus protection, Firewall, Encryption, Network Security, Anti-Virus Software, Security Architecture, Platform Security, Computer Viruses, Spyware, Phishing & Spam protection.

RSS

Half of SMEs fear financial loss from poor IT security and data compliance

1 Half of SMEs fear financial loss from poor IT security and data compliance

Recent research by Ultima, the provider of on-premise and cloud IT infrastructure and managed service solutions, has found that over half (58%) of the UK's SMEs think their businesses are at risk of financial loss from poor IT security and data compliance, with 67% believing they may be out of business in three years if their IT security and compliance doesn't improve.

Frequency and complexity of DDoS attacks is rising

2 Frequency and complexity of DDoS attacks is rising

Netscout Systems has released its 13th Annual Arbor Worldwide Infrastructure Security Report (WISR) offering direct insights from network and security professionals at the world's leading service provider, cloud/hosting and enterprise organisations.

Lanner's HybridTCA platform HTCA-6200 now validated for Wind River Titanium Cloud for the acceleration of carrier-grade NFV solutions

3 Lanner's HybridTCA platform HTCA-6200 now validated for Wind River Titanium Cloud for the acceleration of carrier-grade NFV solutions

Lanner Electronics, Inc. has announced that its NFVi-ready appliance HTCA-6200 is now validated with the Wind River Titanium Cloud portfolio of virtualisation software platforms, offering the high-performance telco hardware and software platform demanded by carrier-grade NFV applications.

SMBs at risk as emails are still in the crosshairs of cybercriminals

4 SMBs at risk as emails are still in the crosshairs of cybercriminals

Small and medium-sized businesses are still on a cloud adoption journey and for the majority of them, embracing a cloud-based email service is the first checkpoint along the way.

Ivanti and CrowdStrike enter into partnership to deliver advanced endpoint security

5 Ivanti and CrowdStrike enter into partnership to deliver advanced endpoint security

Ivanti and CrowdStrike have announced a strategic alliance that brings together next-generation antivirus and endpoint detection and response (EDR) with Ivanti's multi-layered endpoint security solutions.

Emtelle chosen as premier European supplier of FiSpy

6 Emtelle chosen as premier European supplier of FiSpy

The European distribution rights of FiSpy – a new product that uses smart technology to detect micro duct faults – have been awarded to Emtelle, the provider of blown fibre and ducted network solutions for the telecoms industry.

Fraud authorities not visible enough to UK SMEs

7 Fraud authorities not visible enough to UK SMEs

Nearly 6 out of every 10 (58%) of the UK's SMEs do not know who the relevant authorities are to help them deal with fraud, according to research from Close Brothers Asset Finance.

Salaries for cyber security professionals set to rise in 2018

8 Salaries for cyber security professionals set to rise in 2018

The Robert Walters 2018 Salary Survey has found that salaries for cyber security specialists will see the highest salary increases among IT professionals, at 7%. Developers and infrastructure specialists will enjoy salary rises of 3%.

Cyberbit to protect the Bank of Jerusalem from advanced cyberattacks with its EDR system

9 Cyberbit to protect the Bank of Jerusalem from advanced cyberattacks with its EDR system

Cyberbit Ltd., provider of cybersecurity products for detection, response and training across IT and OT systems, will supply the Bank of Jerusalem with Cyberbit Endpoint Detection and Response (EDR) in order to protect the organisation's endpoints from advanced threats.

SolutionsPT and Schneider Electric to host OT cyber security events

10 SolutionsPT and Schneider Electric to host OT cyber security events

Industrial software provider SolutionsPT, together with Schneider Electric, is hosting a series of OT cyber security events, aimed at helping manufacturers protect their industrial control systems and critical infrastructure.

Computer Security

Computer security is the protection of computer systems and information from unauthorized access, use, disclosure, disruption, modification, or destruction. It is a broad field that encompasses a wide range of topics, including:

  • Network security: This is the protection of computer networks from unauthorized access or attack. It includes things like firewalls, intrusion detection systems, and security policies.
  • Application security: This is the protection of software applications from vulnerabilities that could be exploited by attackers. It includes things like code review, penetration testing, and security testing.
  • Data security: This is the protection of sensitive data from unauthorized access, use, disclosure, or destruction. It includes things like encryption, access control, and data backups.
  • Operational security: This is the protection of computer systems from threats that arise from human error or negligence. It includes things like user training, incident response procedures, and security awareness.

Cybersecurity

Cyber security is the practice of protecting computer systems and networks from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users via ransomware; or interrupting normal business processes.

There are many different types of cyber security threats, but some of the most common include:

  • Malware: Malware is software that is designed to harm a computer system. Malware can take many forms, including viruses, worms, trojans, and ransomware.
  • Phishing: Phishing is a type of social engineering attack that involves sending emails or text messages that appear to be from a legitimate source. The goal of phishing is to trick the recipient into clicking on a malicious link or providing personal information.
  • Data breaches: A data breach is an incident in which sensitive data is exposed to unauthorized individuals. Data breaches can occur due to a variety of factors, including hacking, human error, and system vulnerabilities.

Cyber security is a critical issue for businesses of all sizes. In today's digital world, businesses rely on their computer systems and networks to operate. A cyber attack can have a devastating impact on a business, including financial losses, reputational damage, and loss of customer trust.

Cyber security is an ongoing challenge, but by taking steps to protect themselves, businesses can help to mitigate the risks of cyber attacks.

Editorial: +44 (0)1892 536363
Publisher: +44 (0)208 440 0372
Subscribe FREE to the weekly E-newsletter