Computer Security, Internet security, Cybersecurity, Web filtering, IT Protection

Computer security, also known as cybersecurity, is the protection of computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. IT Reseller news and articles relating to Computer Security, Internet security, Web filtering, Virus protection, Firewall, Encryption, Network Security, Anti-Virus Software, Security Architecture, Platform Security, Computer Viruses, Spyware, Phishing & Spam protection.

RSS

Cyber criminals will exploit misunderstanding between the board and IT department

1 Cyber criminals will exploit misunderstanding between the board and IT department

The threat of a breach should be perceived as a real and present danger to large UK organisations, especially in light of BT Chief Gavin Patterson having identified a culture of widespread negligence of proper cyber security practice in the boards of large organisations.

Quantum Xcellis scale-out storage earns honours for video surveillance and security

2 Quantum Xcellis scale-out storage earns honours for video surveillance and security

Quantum Corp. has received the Innovative Security Products award for the new Xcellis high-performance scale-out tiered storage solution at the 2015 Top 10 Innovative Security Products Award Ceremony.

CESG Certified Training rebranded as GCHQ Certified Training

3 CESG Certified Training rebranded as GCHQ Certified Training

CESG Certified Training (CCT) was established in November 2014 to deliver training which satisfies the high standards set by CESG, the information security arm of GCHQ.

Who owns data security? Report highlights business confusion amid rising cyber threats

4 Who owns data security? Report highlights business confusion amid rising cyber threats

Many UK businesses are confused about who should manage data security procedures leaving them at risk from escalating cyber-attacks. This is according to a report, ‘The Data Security and Risk Management Review’, sponsored by managed service provider Advanced 365.

Heating, lighting and physical security most vulnerable systems to cyber attack

5 Heating, lighting and physical security most vulnerable systems to cyber attack

The systems which control heating, lighting and security in most buildings are particularly vulnerable to cyber attack, a QinetiQ whitepaper has warned.

Cyberattacks to be tackled by students

6 Cyberattacks to be tackled by students

Innovative new cyber security software is to be developed by researchers at Leeds Beckett University and the University of Birmingham after receiving an £80,000 grant from the Higher Education Academy (HEA).

Nine cyber security trends for 2016: TÜV Rheinland and OpenSky predict more attacks, new methods and targets

7 Nine cyber security trends for 2016: TÜV Rheinland and OpenSky predict more attacks, new methods and targets

2016 will see an increasing number of attacks and the emergence of new targets; the complexity and sophistication of attacks, initiated by increasingly capable and technically well-equipped cyber criminals, will continue to rise.

Secure document validation from CardLogix

8 Secure document validation from CardLogix

CardLogix, supplier of smart cards and software, has introduced PassCheck, ID Credential Validation Software for Passport and Machine Readible Travel Document (MRTD) verification.

Contactless card protector ‘combats ID theft’

9 Contactless card protector ‘combats ID theft’

ID card manufacturer Databac Group has developed a simple yet secure solution to protect the data on RFID cards.

Cloud Distribution brings SystemFlip's continuous backup and disaster recovery to channel partners

10 Cloud Distribution brings SystemFlip's continuous backup and disaster recovery to channel partners

Cloud Distribution has announced a distribution agreement with SystemFlip bringing channel partners a solution to a universal data protection challenge.

Computer Security

Computer security is the protection of computer systems and information from unauthorized access, use, disclosure, disruption, modification, or destruction. It is a broad field that encompasses a wide range of topics, including:

  • Network security: This is the protection of computer networks from unauthorized access or attack. It includes things like firewalls, intrusion detection systems, and security policies.
  • Application security: This is the protection of software applications from vulnerabilities that could be exploited by attackers. It includes things like code review, penetration testing, and security testing.
  • Data security: This is the protection of sensitive data from unauthorized access, use, disclosure, or destruction. It includes things like encryption, access control, and data backups.
  • Operational security: This is the protection of computer systems from threats that arise from human error or negligence. It includes things like user training, incident response procedures, and security awareness.

Cybersecurity

Cyber security is the practice of protecting computer systems and networks from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users via ransomware; or interrupting normal business processes.

There are many different types of cyber security threats, but some of the most common include:

  • Malware: Malware is software that is designed to harm a computer system. Malware can take many forms, including viruses, worms, trojans, and ransomware.
  • Phishing: Phishing is a type of social engineering attack that involves sending emails or text messages that appear to be from a legitimate source. The goal of phishing is to trick the recipient into clicking on a malicious link or providing personal information.
  • Data breaches: A data breach is an incident in which sensitive data is exposed to unauthorized individuals. Data breaches can occur due to a variety of factors, including hacking, human error, and system vulnerabilities.

Cyber security is a critical issue for businesses of all sizes. In today's digital world, businesses rely on their computer systems and networks to operate. A cyber attack can have a devastating impact on a business, including financial losses, reputational damage, and loss of customer trust.

Cyber security is an ongoing challenge, but by taking steps to protect themselves, businesses can help to mitigate the risks of cyber attacks.

Editorial: +44 (0)1892 536363
Publisher: +44 (0)208 440 0372
Subscribe FREE to the weekly E-newsletter