MENU

This website uses cookies to ensure you get the best experience on our website. Learn More

Knowledge Base

Frequently Asked Questions

  • cyber essentials
  • gap analysis
  • GDPR
  • Glossary
  • IoT
  • ISO 27001
  • managed service
  • phishing
  • phishing video
  • ransomware
  • reporting
  • security awareness
  • Support
  • ulearn

Penetration

Unauthorized access to restricted systems.

Incident

Any event that is not part of the standard operation of a service and that causes, or may cause, an interruption to, or a reduction in, the quality of that service.

Distributed Denial-of-Service (DDoS) attack

A type of DoS attack where multiple compromised systems, for example a Botnet, are used to target a single system causing a DoS attack.

Time Bomb

A malicious program that waits for a specific time before activating its payloads. Time bomb is a form of logic bomb found in Trojan horses.

What are the risks of not doing gap analysis?

There are several: it may include a malicious virus infecting your system, seizure of company records, or lost account privileges. All of them aren’t worth risking in today’s hyper-connected world.

Two-factor authentication

The use of two independent mechanisms for authentication, (e.g., requiring a smart card and a password) typically the combination of something you know, are or have.

Wi-Fi protected access II (WPA2)

Wireless security protocol that supports 802.11i encryption standards to provide greater security. This protocol uses Advanced Encryption Standards (AES) and Temporal Key Integrity Protocol (TKIP) for stronger encryption.