Cyber security, which deals with threat analysis, vulnerability and risk associated with the use of computer tools to protect them from possible internal or external attacks that could cause direct or indirect damage. The first occur when a ransom is required; While the second, perhaps more serious, has to do with the collateral damage they cause, such as when a company no longer has access to its files, can not start up its machines. The protection you must take to prevent these damages does not only concern your business information, but also your corporate reputation, which is closely linked to social networking. The Cyber security in Uk is a recent theme of last years but very important because it involves many companies and citizens who are suffering from cyber attacks. Given its importance, cyber security companies uk have been opened to counter cybercrime and to help businesses and citizens solve problems, and above all to protect themselves before any damage occurs.

In 2012 was launched the CERT-UK (UK national computer emergency response team) but it was publicly launched on 31 March 2014 and closed in October 2016. The cyber security strategy in Uk was to transfer functions and responsibilities to the new UK National Cyber Security Centre. The government’s National Cyber Security Centre London (NCSC), based in Victoria, has officially be opened by the Queen. The national cyber security strategy is to put  £1.9 billion available for tackling cybercrime by 2020. Included in this budget is an undisclosed amount of money for helping to launch cyberattacks against terrorists and other countries. The jobs of National Cyber Security Centre are “complex, challenging and high-profile work, keeping critical IT infrastructure, data, systems and communications safe and secure against a variety of threats”.

Cyber-security in Uk seeks to protect and solve any damage that may affect a user, such as identity theft and scams on the web. Identity theft means appropriating personal data, including, for example, the number of accounts and passwords. Cybercriminals, hackers, to commit such crimes using their vast computer skills, through some methodologies, including, for example: Social engineering, who takes advantage of the trust or lack of knowledge of the computer security of the victim; One of the most famous is phishing, which is a kind of scam via e-mail, aimed at deceiving the victim by persuading him to provide personal information, financial data or access codes, by pretending to be a trusted institution, such as banks, post offices, etc ., Where you are invited to enter your access data. Another type of cyber security activity is the malicious code that concerns a malicious software program that enters the victim’s PC, acquiring a whole range of passive information (files, folders, Photo) is active (real-time tracking of everything you type the user, webcam, live audio).