Welcome to Our Computer Security Glossary
Is installing anti-virus software enough? Most people are unsure.
The only certainty is that your systems will be attacked. Can they survive?
Cybercrime pays. The total dollar loss exceeds the illegal global drug trade.
Cyber-criminals actively scan the Internet for vulnerable computers, smart phones and tablets and when discovered each can be quickly compromised.
You can learn how to secure your computers, smart phones and tablets.
Our cyber security definitions and other resources can help you make sense of the problem.
We encourage you to visit us often and to let your friends and associates know about us.
Use our glossary of information security terms and reports are designed to help you learn more about how to protect your information assets. And our site is free.
Everyone who uses a computer, tablet or smart phone at home or in business face serious risks. Malicious hackers, viruses, spyware, Trojans and malware pose significant problem. The threats against your sensitive information are increasing and becoming more sophisticated.
The consequences of a security breach are becoming more serious.
Did you know that you could even be held legally liable (or face significant fines) for disclosing confidential information or a failing to follow through with information security best practices?
Among the items for which you are responsible to protect are customer identities or PII (personal identifiable information), the loss of confidential Research & Development information, the unauthorized release of sensitive information (HIPAA) or in money being stolen from your bank accounts.
There are few basic questions. Have you taken the steps necessary to protect the confidentiality, integrity, and availability of your person systems or your company's mission critical data and private information? Do have an information security plan or know what one is?
Let us help you enhance your information security posture. We'll keep adding to our site so you can depend upon us as a comprehensive resource and authority. We are dedicated to helping you protect your information assets.
Recommend us to a friend.
Click on the link below to get an answer to the following question: "Can Your Organization Survive a Cyber Intrusion?