Securing a computer network from intruders, whether targeted attackers or opportunistic malware.
Focuses on keeping software and devices free of threats. A compromised application could provide access to the data its designed to protect. Successful security begins in the design stage, well before a program or device is deployed
How an organization responds to a cyber-security incident or any other event that causes the loss of operations or data.
One of the most overlooked forms of security for your technology is physical security. While anti-virus and firewalls may protect from offsite intruders, in order to properly protect your data, physical security is a requirement.