top of page
Cyber information Videos
What is a VPN?
A virtual private network, or VPN, is a technology that creates a secure connection over a less-secure network. A VPN enables users to...
2 views
What is Spoofing?
Spoofing is a type of attack where a person or program tries to deceive other people or programs by providing false information. It is...
2 views
What is a man-in-the-middle attack (MITM) ?
A man-in-the-middle attack (MITM) is a type of cyberattack where a malicious actor inserts themselves into a conversation between two...
1 view
What is a Hacker?
A black hat hacker is an individual who uses their technical knowledge and skills to gain unauthorised access to computer systems,...
1 view
What is a Firewall?
A firewall is a system or group of systems that are designed to prevent unauthorised access to or from a private network. Firewalls can...
1 view
What is a cyber Exploit?
A cyber exploit is a piece of software, a code or a set of commands that takes advantage of a vulnerability in order to execute...
4 views
What is Encryption?
Encryption is the process of transforming readable data into an unreadable format. The purpose of encryption is to protect the data from...
0 views
What is a domain name?
A domain name is the name of a website. It is the address that you type into a web browser to visit a website. Domain names are purchased...
1 view
What is Anti-Phishing?
Anti-Phishing is a technique used to protect users from phishing attacks. Phishing attacks are attempts to steal users' personal...
1 view
What is a Data Breach?
A data breach is an incident in which sensitive, confidential, or proprietary information is accessed, stolen, or released by an...
2 views
What is a Brute Force Attack?
A brute force attack is a method of defeating a security system by trying every possible combination of passwords or other authentication...
1 view
What is Attack Vector?
An attack vector is a path or means by which a hacker can gain access to a computer or network server in order to launch an attack....
2 views
What is Anti-Botnet?
Anti-botnet is a term used to describe a variety of technologies and services that are used to prevent, detect, and mitigate the impact...
3 views
What is Adware?
Adware is a type of malware that displays unwanted advertising on your computer. It can also change your browser’s settings, including...
0 views
What is Security information and event management (SIEM)?
SIEM is a system that monitors the security of an organisation. It is used to collect, analyze and store security-related data from...
0 views
What is Network security?
Network security is the process of protecting your computer networks from unauthorised access and attacks. Network security solutions can...
0 views
What is Endpoint security?
Endpoint security is the protection of computing devices that are connected to a network. These devices, often called endpoints, can...
1 view
What is Web security?
Web security is the process of protecting your website from unauthorised access and use, as well as from unauthorised changes to the...
2 views
What is Email security?
Email security is the process of protecting email communications and email-based information systems from unauthorised access, use, or...
1 view
What is Advanced Threat Protection?
Advanced Threat Protection (ATP) is a term used to describe a variety of security solutions that are designed to protect organisations...
6 views
bottom of page