INFORMATION SECURITY

Information security is the practice of preventing information from unauthorized access, use, disclosure, corruption, modification, auditing, recording or destruction. It is a general term that can be used regardless of what form (e.g. electronic, physical) data may belong to.

Information technology security, sometimes called computer security, is the name given to information security applied to technology (usually some type of computer system). It is important to remember that a computer does not necessarily mean a home desktop computer. A computer is any device that has a processor and memory. Such devices can range from stand-alone non-network devices such as calculators to networked mobile computing devices such as smartphones and tablet computers. Computer technology security professionals are found in almost every large organization because of the nature and value of data in large businesses. They are responsible for keeping all technology within the company free from malicious cyber attacks that attempt to break critical private information or gain control of internal systems.

The act of securing information ensures that the Confidentiality, Integrity and Availability of the information is not violated, for example, data is not lost when critical problems occur. These issues include, but are not limited to: natural disasters, computer/server failure, or physical theft. As most information is stored on computers in our modern age, information security is often handled by computer technology security professionals. A widely used method of ensuring information security is to keep a backup of the data as a precaution in case one of the mentioned problems occurs.

Information security threats come in many different forms. The most common threats today are software attacks, intellectual property theft, identity theft, equipment or information theft, sabotage and information extortion. ERY Informatics continues to work with an expert team to protect its customers from all these threats.

 

Information Security Team

Follow us

en_USEN