top of page
lowpoly-7741163_1920_edited.png

Glossary

Access Controls:

Measures to restrict who can access certain information and systems.


Antivirus Software:

A programme that detects and removes malicious software from your computer and devices.


Authentication:

The process of verifying a user's identity before granting access.


Backup:

A copy of your data stored separately to restore in case of data loss.


Botnet:

A network of infected computers controlled by a hacker.


Brute Force Attack:

A method of cracking passwords by trying many combinations until the correct one is found.


Cloud Security:

Measures to protect data and applications stored in cloud services.


Compliance:

Ensuring that your cybersecurity measures meet industry standards and legal requirements.


Cryptocurrency:

Digital currency that uses encryption for security.


Cybersecurity Posture:

The overall strength and effectiveness of an organisation's cybersecurity measures to protect against cyber threats.

Data Breach:

An incident where sensitive information is accessed without authorisation.


Data Encryption:

Converting data into a secure format that can only be read with a key.


Denial of Service (DoS):

An attack that overloads a system to make it unavailable to users.


Endpoint Security:

Protecting all devices connected to your network, like a computer, tablet or smartphone.

Firewall:

A security system that controls incoming and outgoing network traffic based on predetermined security rules.


Hacker:

Someone who gains unauthorised access to computer systems.


Incident Response Plan:

A plan for dealing with cybersecurity breaches and minimising damage.


Incident Response:

The process of handling and recovering from a cybersecurity breach.


Insider Threat:

A security risk that originates from within the organisation.


Malware:

Malicious software designed to harm or exploit any programmable device.


Multi-Factor Authentication (MFA):

A security system that requires more than one method of authentication to verify a user's identity before granting access.


Network Monitoring:

Continuously observing your network for unusual activity that could indicate a security threat.

Patch:

A software update that fixes vulnerabilities and improves security.


Penetration Test (Pentest):

A simulated cyber attack to identify and fix security weaknesses.


Phishing:

A scam where attackers trick you into providing personal information by pretending to be a trusted entity.


Ransomware:

Malware that locks your data and demands payment to unlock it.


Risk Assessment:

Evaluating potential threats and vulnerabilities to understand the level of risk to your organisation.

Security Audit:

A review of your cybersecurity measures to ensure they are effective and up to date.


Social Engineering:

Manipulating people into revealing confidential information.


Spam:

Unsolicited and often irrelevant or inappropriate messages sent over the internet.


Spyware:

Software that secretly monitors and collects information about you.


Threat Detection:

Identifying and responding to potential cyber threats in real-time.


Trojan Horse:

A type of malware that disguises itself as a legitimate program.


Virus:

Malware that replicates itself and spreads to other computers.


Vulnerability:

A weakness in a system that can be exploited by cyber threats.


VPN (Virtual Private Network):

A service that encrypts your internet connection to ensure privacy and security.


Worm:

A type of malware that spreads copies of itself from computer to computer.​

bottom of page