IT security: the protection of data, systems, networks, and operations.
Technology defenses are necessary, but they’re not sufficient because protecting data and business operations also involves:
Implementing and enforcing acceptable use policies (AUPs).
Complying with government regulations and laws.
Making data and documents available 24x7 while restricting access.
Promoting secure and legal sharing of information.
Preventing attacks by having network intrusion defenses in place.