Frequently Asked Questions
- cyber essentials
- gap analysis
- ISO 27001
- managed service
- phishing video
- security awareness
Unauthorized access to restricted systems.
Any event that is not part of the standard operation of a service and that causes, or may cause, an interruption to, or a reduction in, the quality of that service.
Distributed Denial-of-Service (DDoS) attack
A type of DoS attack where multiple compromised systems, for example a Botnet, are used to target a single system causing a DoS attack.
A malicious program that waits for a specific time before activating its payloads. Time bomb is a form of logic bomb found in Trojan horses.
What are the risks of not doing gap analysis?
There are several: it may include a malicious virus infecting your system, seizure of company records, or lost account privileges. All of them aren’t worth risking in today’s hyper-connected world.
The use of two independent mechanisms for authentication, (e.g., requiring a smart card and a password) typically the combination of something you know, are or have.
Wi-Fi protected access II (WPA2)
Wireless security protocol that supports 802.11i encryption standards to provide greater security. This protocol uses Advanced Encryption Standards (AES) and Temporal Key Integrity Protocol (TKIP) for stronger encryption.