A Content Access Security Broker (CASB) is a security tool that provides oversight and control over the data and applications used in...
Boundary Firewalls and Internal Gateways, Secure Configurations, Access Controls, Malware Protect and Security Updates
Cyber Essentials and the Plus version follow the same guidelines, however the difference is that a certification body, such as Data Connect,...
Cyber Essentials is a government backed scheme (UK) that will help you protect your organisation, whatever its size, against a range of...
In line with the Computer Misuse Act (1990), a cyber incident is a breach of a system's security policy in order to affect...
An attempt to gain illegal access to a single or multiple computer or network. Launched by a cyber criminal, cyber attacks are...
Cross Site Scripting is an attack method whereby the attacker has infected a website with malicious scripts onto an otherwise trusted site....
Verifies and authenticate a user’s identity such as password or certification.
A method or system that an organisation uses to reduce a security threat.
The successful penetration into a system by a malicious actor.
An industry standard that gives each vulnerability a qualitative score of its severity, starting from 0 to 10. There are multiple versions to...