This type of authentication is a process where two parties in communication verify each other before a data exchange can take place....
Multi-Level Security is a system used to classify the level of access users have based on their hierarchy to allow visibility to...
The use of more than two different methods of identification.
Managed Detection and Response - A managed service that provides detection of malicious activity in an organisation's network as well as rapid...
A Man in the Middle attack is an attack whereby an attacker has inserted themselves between two devices and is listening to,...
Provides outsources monitoring and management of security systems or devices, including managed firewalls and vulnerability scanning.
Software that the user wasn’t expecting and that they didn’t ask for that can do harm.
Malware that exploits applications such as word processor or spreadsheet software, otherwise known as macro languages.