MENU

This website uses cookies to ensure you get the best experience on our website. Learn More

Knowledge Base

Frequently Asked Questions

  • cyber essentials
  • gap analysis
  • GDPR
  • Glossary
  • IoT
  • ISO 27001
  • managed service
  • phishing
  • phishing video
  • ransomware
  • reporting
  • security awareness
  • Support
  • ulearn

Threat vector

The path or route used by the adversary to gain access to the target

Regulatory requirements

Rules or laws that regulate conduct and that the enterprise must obey to become compliant.

Penetration

Unauthorized access to restricted systems.

What are the main components of Cyber Essentials?

The scheme focuses on five main procedures: boundary firewalls, configuration tactics, access control, path management and avoiding malware. Together, these subjects form the bedrock of any comprehensive security awareness training.

What is information security awareness?

Information security awareness relates specifically to IT; it’s a formal programme designed to educate employees on cyber security.

Incident response plan

The operational component of incident management

Phishing Videos

 

If we put some text in ht3r4r4

and at the end