Are Your Information Assets Secure? Use our Computer Security Glossary to Find Out for Sure.

Financial losses due to cyber crime now exceed the dollar amount of the illegal drug trade.

We publish the Computer Security Glossary for a reason. Stories about massive security breaches blaze across newspaper headlines and television news broadcasts each and every day. Estimates of the combined losses due to cybercrime run as high as 1 trillion dollars globally. The problem is failing to get any better and is about to get much worse as the use of the Internet's latest protocol IPV6 expands out the "Internet of Things".

People need to know more about how to secure their computers, smart phones and protect their electronic information.

How much do you know about computer security? Most people are slightly aware. You can use our computer security glossary to learn more about how to protect your information assets. Please visit us often, review our definitions as needed, read our security articles. Recommend us to a friend.

Everyone who uses a computer, tablet or smart phone at home or in business faces serious risks. Malicious hackers, viruses, spyware, Trojan horses and malware pose significant threats. The threats are increasing and becoming more sophisticated.

Crackers, cyber-criminals and even cyber-terrorists routinely scan the Internet and airways for computers and other electronic devices that can easily be compromised. Malicious intruders can easily penetrate your system if your defenses are weak. You can earn how to combat threats.

If you are vulnerable, however, your personal or business system computer systems can be attacked and made unavailable to authorized users. Business and personal computers can be "drafted" into a bot-army for the purpose of committing cyber-crimes. Did you know that you could even be held legally liable (or face significant fines) for the disclosure of confidential information or a failure to follow information security best practices? You might even be exposed to downstream liability.

A successful cyberattack can result in customer identities being stolen by the disclosure of PII, the loss of confidential R &D information, the unauthorized release of compliance information (HIPAA) or in money being stolen from your bank accounts. You must now be concerned about your digital footprint in the mobile environment as more and more people work on the move.

Have you taken systematic steps to protect the confidentiality, integrity, and availability of your company's or your personal information? Do to have a information security plan?

Use our computer security glossary to learn the basics of what you need to know to provide for information security and to comply with the the legal "due diligence standard". Visit us often and help us build this FREE and comprehensive resource that is dedicated to protecting your information assets.