Just click the chat icon in the right-hand corner.
Cyber security is the practice of protecting your applications, your information and your computer systems from unauthorised access and exploitation via email and the Internet. Another name for cyber security is information technology (IT) security.
Before you can put security measures in place you need to know what kind of security you need.
The four major areas that cyber security encompasses are:
Information security has become more important as information has become more valuable. In today’s world data is hot property and hackers are out to get their hands on it.
Whether you keep your personal documents, professional documents, images and emails on your computer or in the cloud, you need to protect them in the same way. Why? Because having an Internet connection means that hackers are able to access the data on your computer while you’re online.
You can protect your information by:
Application security involves the use of software, hardware and regular actions to protect your apps from cyber threats. Globally used apps such as Adobe Reader, Adobe Flash and Oracle Java have been repeatedly used by hackers to execute their cyber crimes.
You can improve your app security by:
Network security involves using software and hardware technology to protect all points in a computer network. A weakness arriving at one computer station can quickly spread to all stations on a network, so it’s a vital aspect of cyber security.
You can achieve network security by:
Disaster recovery is an IT process that minimises the effects of a major or minor disruption and keeps your business running while the disruption is being sorted out. In other words, it’s a reactive plan to 1) ensure your data loss is a temporary problem and 2) enable you to restore your business operations fast.
Because each business is different, a disaster recovery plan should be tailored to suit the business’s particular needs.
A disaster recovery plan needs to:
Note: This content is general advice and should not be construed as paid-for cyber security advice and instruction.