top of page
Cyber information Videos
![](https://static.wixstatic.com/media/84441c_128cc7ae1ae4457fa4b97fefea3ef077f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_128cc7ae1ae4457fa4b97fefea3ef077f000.webp)
![What is a VPN?](https://static.wixstatic.com/media/84441c_128cc7ae1ae4457fa4b97fefea3ef077f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_128cc7ae1ae4457fa4b97fefea3ef077f000.webp)
What is a VPN?
A virtual private network, or VPN, is a technology that creates a secure connection over a less-secure network. A VPN enables users to...
2 views
![](https://static.wixstatic.com/media/84441c_34ed8be2fb394d56b490fdfb1c981616f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_34ed8be2fb394d56b490fdfb1c981616f000.webp)
![What is Spoofing?](https://static.wixstatic.com/media/84441c_34ed8be2fb394d56b490fdfb1c981616f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_34ed8be2fb394d56b490fdfb1c981616f000.webp)
What is Spoofing?
Spoofing is a type of attack where a person or program tries to deceive other people or programs by providing false information. It is...
2 views
![](https://static.wixstatic.com/media/84441c_2acdf96bf7074227a980c693d1be584bf000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_2acdf96bf7074227a980c693d1be584bf000.webp)
![What is a man-in-the-middle attack (MITM) ?](https://static.wixstatic.com/media/84441c_2acdf96bf7074227a980c693d1be584bf000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_2acdf96bf7074227a980c693d1be584bf000.webp)
What is a man-in-the-middle attack (MITM) ?
A man-in-the-middle attack (MITM) is a type of cyberattack where a malicious actor inserts themselves into a conversation between two...
1 view
![](https://static.wixstatic.com/media/84441c_1a1e498e6be341ceb551eff5ac125811f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_1a1e498e6be341ceb551eff5ac125811f000.webp)
![What is a Hacker?](https://static.wixstatic.com/media/84441c_1a1e498e6be341ceb551eff5ac125811f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_1a1e498e6be341ceb551eff5ac125811f000.webp)
What is a Hacker?
A black hat hacker is an individual who uses their technical knowledge and skills to gain unauthorised access to computer systems,...
1 view
![](https://static.wixstatic.com/media/84441c_3bd5b92c37d34df0989aff9f1e0d108cf000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_3bd5b92c37d34df0989aff9f1e0d108cf000.webp)
![What is a Firewall?](https://static.wixstatic.com/media/84441c_3bd5b92c37d34df0989aff9f1e0d108cf000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_3bd5b92c37d34df0989aff9f1e0d108cf000.webp)
What is a Firewall?
A firewall is a system or group of systems that are designed to prevent unauthorised access to or from a private network. Firewalls can...
1 view
![](https://static.wixstatic.com/media/84441c_28f460cf1003442fb7f693a12b75b80df000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_28f460cf1003442fb7f693a12b75b80df000.webp)
![What is a cyber Exploit?](https://static.wixstatic.com/media/84441c_28f460cf1003442fb7f693a12b75b80df000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_28f460cf1003442fb7f693a12b75b80df000.webp)
What is a cyber Exploit?
A cyber exploit is a piece of software, a code or a set of commands that takes advantage of a vulnerability in order to execute...
4 views
![](https://static.wixstatic.com/media/84441c_3bd5b92c37d34df0989aff9f1e0d108cf000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_3bd5b92c37d34df0989aff9f1e0d108cf000.webp)
![What is Encryption?](https://static.wixstatic.com/media/84441c_3bd5b92c37d34df0989aff9f1e0d108cf000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_3bd5b92c37d34df0989aff9f1e0d108cf000.webp)
What is Encryption?
Encryption is the process of transforming readable data into an unreadable format. The purpose of encryption is to protect the data from...
0 views
![](https://static.wixstatic.com/media/84441c_08ebabc916f440bbb4c3cda871bcc59ef000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_08ebabc916f440bbb4c3cda871bcc59ef000.webp)
![What is a domain name?](https://static.wixstatic.com/media/84441c_08ebabc916f440bbb4c3cda871bcc59ef000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_08ebabc916f440bbb4c3cda871bcc59ef000.webp)
What is a domain name?
A domain name is the name of a website. It is the address that you type into a web browser to visit a website. Domain names are purchased...
1 view
![](https://static.wixstatic.com/media/84441c_feba83a107dc495083ef6efbfb7a44c0f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_feba83a107dc495083ef6efbfb7a44c0f000.webp)
![What is Anti-Phishing?](https://static.wixstatic.com/media/84441c_feba83a107dc495083ef6efbfb7a44c0f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_feba83a107dc495083ef6efbfb7a44c0f000.webp)
What is Anti-Phishing?
Anti-Phishing is a technique used to protect users from phishing attacks. Phishing attacks are attempts to steal users' personal...
1 view
![](https://static.wixstatic.com/media/84441c_a446974918d1429cbb90ec3c3f990f2af000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_a446974918d1429cbb90ec3c3f990f2af000.webp)
![What is a Data Breach?](https://static.wixstatic.com/media/84441c_a446974918d1429cbb90ec3c3f990f2af000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_a446974918d1429cbb90ec3c3f990f2af000.webp)
What is a Data Breach?
A data breach is an incident in which sensitive, confidential, or proprietary information is accessed, stolen, or released by an...
2 views
![](https://static.wixstatic.com/media/84441c_dace0fc14b464e94af206f9fca859023f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_dace0fc14b464e94af206f9fca859023f000.webp)
![What is a Brute Force Attack?](https://static.wixstatic.com/media/84441c_dace0fc14b464e94af206f9fca859023f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_dace0fc14b464e94af206f9fca859023f000.webp)
What is a Brute Force Attack?
A brute force attack is a method of defeating a security system by trying every possible combination of passwords or other authentication...
1 view
![](https://static.wixstatic.com/media/84441c_e036265524284b7c83fb9a83639275a7f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_e036265524284b7c83fb9a83639275a7f000.webp)
![What is Attack Vector?](https://static.wixstatic.com/media/84441c_e036265524284b7c83fb9a83639275a7f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_e036265524284b7c83fb9a83639275a7f000.webp)
What is Attack Vector?
An attack vector is a path or means by which a hacker can gain access to a computer or network server in order to launch an attack....
2 views
![](https://static.wixstatic.com/media/84441c_fbfdad1aa4fd42b9a2e456757139dbabf000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_fbfdad1aa4fd42b9a2e456757139dbabf000.webp)
![What is Anti-Botnet?](https://static.wixstatic.com/media/84441c_fbfdad1aa4fd42b9a2e456757139dbabf000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_fbfdad1aa4fd42b9a2e456757139dbabf000.webp)
What is Anti-Botnet?
Anti-botnet is a term used to describe a variety of technologies and services that are used to prevent, detect, and mitigate the impact...
3 views
![](https://static.wixstatic.com/media/84441c_61ad0f399d414efa89bbb890f90e2bedf000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_61ad0f399d414efa89bbb890f90e2bedf000.webp)
![What is Adware?](https://static.wixstatic.com/media/84441c_61ad0f399d414efa89bbb890f90e2bedf000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_61ad0f399d414efa89bbb890f90e2bedf000.webp)
What is Adware?
Adware is a type of malware that displays unwanted advertising on your computer. It can also change your browser’s settings, including...
0 views
![](https://static.wixstatic.com/media/84441c_1664c3f27c744941a2ea77f6e20b2793f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_1664c3f27c744941a2ea77f6e20b2793f000.webp)
![What is Security information and event management (SIEM)?](https://static.wixstatic.com/media/84441c_1664c3f27c744941a2ea77f6e20b2793f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_1664c3f27c744941a2ea77f6e20b2793f000.webp)
What is Security information and event management (SIEM)?
SIEM is a system that monitors the security of an organisation. It is used to collect, analyze and store security-related data from...
0 views
![](https://static.wixstatic.com/media/84441c_602b78c11a0041358fd3e74d93d3e2b1f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_602b78c11a0041358fd3e74d93d3e2b1f000.webp)
![What is Network security?](https://static.wixstatic.com/media/84441c_602b78c11a0041358fd3e74d93d3e2b1f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_602b78c11a0041358fd3e74d93d3e2b1f000.webp)
What is Network security?
Network security is the process of protecting your computer networks from unauthorised access and attacks. Network security solutions can...
0 views
![](https://static.wixstatic.com/media/84441c_3dff6a2ec9f945b7a5482be62a0ca4e4f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_3dff6a2ec9f945b7a5482be62a0ca4e4f000.webp)
![What is Endpoint security?](https://static.wixstatic.com/media/84441c_3dff6a2ec9f945b7a5482be62a0ca4e4f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_3dff6a2ec9f945b7a5482be62a0ca4e4f000.webp)
What is Endpoint security?
Endpoint security is the protection of computing devices that are connected to a network. These devices, often called endpoints, can...
1 view
![](https://static.wixstatic.com/media/84441c_247d0870a85c4a3c9c3d4967559767a1f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_247d0870a85c4a3c9c3d4967559767a1f000.webp)
![What is Web security?](https://static.wixstatic.com/media/84441c_247d0870a85c4a3c9c3d4967559767a1f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_247d0870a85c4a3c9c3d4967559767a1f000.webp)
What is Web security?
Web security is the process of protecting your website from unauthorised access and use, as well as from unauthorised changes to the...
2 views
![](https://static.wixstatic.com/media/84441c_cb9d80c7699640e49df3cbcfcfa44a96f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_cb9d80c7699640e49df3cbcfcfa44a96f000.webp)
![What is Email security?](https://static.wixstatic.com/media/84441c_cb9d80c7699640e49df3cbcfcfa44a96f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_cb9d80c7699640e49df3cbcfcfa44a96f000.webp)
What is Email security?
Email security is the process of protecting email communications and email-based information systems from unauthorised access, use, or...
1 view
![](https://static.wixstatic.com/media/84441c_3f251afe8ea047bf9c2ad1c2d7c5e1cbf000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_3f251afe8ea047bf9c2ad1c2d7c5e1cbf000.webp)
![What is Advanced Threat Protection?](https://static.wixstatic.com/media/84441c_3f251afe8ea047bf9c2ad1c2d7c5e1cbf000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_3f251afe8ea047bf9c2ad1c2d7c5e1cbf000.webp)
What is Advanced Threat Protection?
Advanced Threat Protection (ATP) is a term used to describe a variety of security solutions that are designed to protect organisations...
6 views
bottom of page