Computer Security, Internet security, Cybersecurity, Web filtering, IT Protection

Computer security, also known as cybersecurity, is the protection of computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. IT Reseller news and articles relating to Computer Security, Internet security, Web filtering, Virus protection, Firewall, Encryption, Network Security, Anti-Virus Software, Security Architecture, Platform Security, Computer Viruses, Spyware, Phishing & Spam protection.

RSS

Potential major takedown of an IoT manufacturer’s services or devices

1 Potential major takedown of an IoT manufacturer’s services or devices

By Laurence Pitt, Security Strategy Director, Juniper Networks.

In a recent blog I discussed the risks associated with IoT. If we look at information technology progress in the last 25 years, it seems that malware or data-theft quickly follows major technology milestones. Let's look at some examples:

Cyberespionage and ransomware attacks are on the increase warns the Verizon 2017 Data Breach Investigations Report

2 Cyberespionage and ransomware attacks are on the increase warns the Verizon 2017 Data Breach Investigations Report

Cyberespionage is now the most common type of attack seen in manufacturing, the public sector and now education, warns the Verizon 2017 Data Breach Investigations Report.

Cyber Security is a 'people problem' says IISP Survey

3 Cyber Security is a 'people problem' says IISP Survey

Over 80% of security professionals identify ‘people’ as the industry’s biggest challenge compared to technology and processes, according to the results of the second annual survey from The Institute of Information Security Professionals (IISP).

How to avoid being lost in the IoT explosion

4 How to avoid being lost in the IoT explosion

By Jordan O'Connor, Technical Lead EMEA, SOTI.

IoT is having a profound effect on business. 57 per cent of all global businesses have adopted IoT practices and 72 per cent of those believe their company is more profitable since embracing IoT.

Carbon Black builds channel to aid disruption to antivirus market

5 Carbon Black builds channel to aid disruption to antivirus market

By Miles Rippon, EMEA channel director, Carbon Black.

According to recent research, traditional antivirus products are failing to deliver the security improvements needed to protect organisations against modern threats.

Almost half of UK firms hit by cyber breach or attack in the past year

6 Almost half of UK firms hit by cyber breach or attack in the past year

Businesses large and small are being urged to protect themselves against cyber crime after new Government statistics found nearly half of all UK businesses suffered a cyber breach or attack in the past 12 months.

CTERA introduces on-demand cloud data protection on AWS marketplace

7 CTERA introduces on-demand cloud data protection on AWS marketplace

CTERA Networks has announced that its Cloud Server Data Protection Platform is now available on-demand on AWS Marketplace, allowing enterprises to quickly and easily deploy a fully automated file-level backup and recovery solution for cloud-based servers and applications.

WatchGuard launches new quarterly Internet security report

8 WatchGuard launches new quarterly Internet security report

WatchGuard Technologies has released the findings of its inaugural quarterly Internet Security Report, which explores the latest computer and network security threats affecting small to midsize businesses (SMBs) and distributed enterprises.

Channel summit raises awareness of GDPR sales opportunities as deadline for compliance looms

9 Channel summit raises awareness of GDPR sales opportunities as deadline for compliance looms

The countdown clock to GDPR (General Data Protection Regulation) is ticking fast and with less than 14 months left until it comes into full force we continue to see a growth in data breaches and fines.

Business email compromise (BEC) attacks increase 45 percent, 2/3 use spoofed email domains to trick victims

10 Business email compromise (BEC) attacks increase 45 percent, 2/3 use spoofed email domains to trick victims

Proofpoint, Inc., the next-generation security and compliance company, has released new research into business email compromise (BEC) attacks which indicates an acceleration in their sophistication and velocity.

Computer Security

Computer security is the protection of computer systems and information from unauthorized access, use, disclosure, disruption, modification, or destruction. It is a broad field that encompasses a wide range of topics, including:

  • Network security: This is the protection of computer networks from unauthorized access or attack. It includes things like firewalls, intrusion detection systems, and security policies.
  • Application security: This is the protection of software applications from vulnerabilities that could be exploited by attackers. It includes things like code review, penetration testing, and security testing.
  • Data security: This is the protection of sensitive data from unauthorized access, use, disclosure, or destruction. It includes things like encryption, access control, and data backups.
  • Operational security: This is the protection of computer systems from threats that arise from human error or negligence. It includes things like user training, incident response procedures, and security awareness.

Cybersecurity

Cyber security is the practice of protecting computer systems and networks from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users via ransomware; or interrupting normal business processes.

There are many different types of cyber security threats, but some of the most common include:

  • Malware: Malware is software that is designed to harm a computer system. Malware can take many forms, including viruses, worms, trojans, and ransomware.
  • Phishing: Phishing is a type of social engineering attack that involves sending emails or text messages that appear to be from a legitimate source. The goal of phishing is to trick the recipient into clicking on a malicious link or providing personal information.
  • Data breaches: A data breach is an incident in which sensitive data is exposed to unauthorized individuals. Data breaches can occur due to a variety of factors, including hacking, human error, and system vulnerabilities.

Cyber security is a critical issue for businesses of all sizes. In today's digital world, businesses rely on their computer systems and networks to operate. A cyber attack can have a devastating impact on a business, including financial losses, reputational damage, and loss of customer trust.

Cyber security is an ongoing challenge, but by taking steps to protect themselves, businesses can help to mitigate the risks of cyber attacks.

Editorial: +44 (0)1892 536363
Publisher: +44 (0)208 440 0372
Subscribe FREE to the weekly E-newsletter