Mutual Authentication

This type of authentication is a process where two parties in communication verify each other before a data exchange can take place....

659 January 11, 2023
Multilevel Security (MLS)

Multi-Level Security is a system used to classify the level of access users have based on their hierarchy to allow visibility to...

658 January 11, 2023
Multi Factor Authentication (MFA)

The use of more than two different methods of identification.

657 January 11, 2023
Managed Detection & Response (MDR)

Managed Detection and Response - A managed service that provides detection of malicious activity in an organisation's network as well as rapid...

656 January 11, 2023
Man-in-the-middle (MitM) Attack

A Man in the Middle attack is an attack whereby an attacker has inserted themselves between two devices and is listening to,...

655 January 11, 2023
Managed Security Services Providers (MSSP)

Provides outsources monitoring and management of security systems or devices, including managed firewalls and vulnerability scanning.

654 January 11, 2023
Malware

Examples of malicious software are worms, viruses, trojans or any other code or content that causes a security problem within a system.

653 January 11, 2023
Malicious Code

Software that the user wasn’t expecting and that they didn’t ask for that can do harm.

652 January 11, 2023
Macro Virus

Malware that exploits applications such as word processor or spreadsheet software, otherwise known as macro languages.

651 January 11, 2023