top of page
Cyber information Videos
![](https://static.wixstatic.com/media/84441c_9694915a6f354bc9971c9a852d7e1516f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_9694915a6f354bc9971c9a852d7e1516f000.webp)
![What is the Dark Web?](https://static.wixstatic.com/media/84441c_9694915a6f354bc9971c9a852d7e1516f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_9694915a6f354bc9971c9a852d7e1516f000.webp)
What is the Dark Web?
Ever wondered what the dark web is? A short video and explanation of Dark web and VPN.
14 views
![](https://static.wixstatic.com/media/84441c_f02e3906721f47a0b1a50e367a43b453f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_f02e3906721f47a0b1a50e367a43b453f000.webp)
![What is Cryptojacking?](https://static.wixstatic.com/media/84441c_f02e3906721f47a0b1a50e367a43b453f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_f02e3906721f47a0b1a50e367a43b453f000.webp)
What is Cryptojacking?
Cryptojacking is the process of using a victim's device to mine cryptocurrency without their knowledge
11 views
![](https://static.wixstatic.com/media/84441c_b438e124e54b4a4488eb0761c7d16414f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_b438e124e54b4a4488eb0761c7d16414f000.webp)
![What is the Internet of Things (IoT)?](https://static.wixstatic.com/media/84441c_b438e124e54b4a4488eb0761c7d16414f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_b438e124e54b4a4488eb0761c7d16414f000.webp)
What is the Internet of Things (IoT)?
The Internet of Things (IoT) is a network of physical objects that are embedded with electronics, software, sensors, and connectivity to...
7 views
![](https://static.wixstatic.com/media/84441c_4a23a78573c2447cb61514acf00dd5eef000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_4a23a78573c2447cb61514acf00dd5eef000.webp)
![What is Multi-Factor Authentication?](https://static.wixstatic.com/media/84441c_4a23a78573c2447cb61514acf00dd5eef000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_4a23a78573c2447cb61514acf00dd5eef000.webp)
What is Multi-Factor Authentication?
This method of authentication requires the user to provide two or more pieces of information in order to log in.
5 views
![](https://static.wixstatic.com/media/84441c_853ab38f1a71413bbd70177afd78d34ff000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_853ab38f1a71413bbd70177afd78d34ff000.webp)
![What is AI Deepfake?](https://static.wixstatic.com/media/84441c_853ab38f1a71413bbd70177afd78d34ff000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_853ab38f1a71413bbd70177afd78d34ff000.webp)
What is AI Deepfake?
Deepfake media manipulation aided by artificial intelligence, which is created by combining and altering two different images or videos.
8 views
![](https://static.wixstatic.com/media/84441c_467ea734d4e240e0ba40dc5d33bc33fef000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_467ea734d4e240e0ba40dc5d33bc33fef000.webp)
![What is Clickjacking?](https://static.wixstatic.com/media/84441c_467ea734d4e240e0ba40dc5d33bc33fef000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_467ea734d4e240e0ba40dc5d33bc33fef000.webp)
What is Clickjacking?
Clickjacking is a malicious technique of tricking users into clicking on something other than what they think they are clicking.
9 views
![](https://static.wixstatic.com/media/84441c_d5d5c5267ae441e3abf42eca6fd828f9f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_d5d5c5267ae441e3abf42eca6fd828f9f000.webp)
![What is Pen-testing?](https://static.wixstatic.com/media/84441c_d5d5c5267ae441e3abf42eca6fd828f9f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_d5d5c5267ae441e3abf42eca6fd828f9f000.webp)
What is Pen-testing?
Pen-testing is the process of analysing a system to detect security flaws and vulnerabilities.
4 views
![](https://static.wixstatic.com/media/84441c_303c65f7c3f945a886655c66cf062719f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_303c65f7c3f945a886655c66cf062719f000.webp)
![What is BYOD (Bring Your Own Device)?](https://static.wixstatic.com/media/84441c_303c65f7c3f945a886655c66cf062719f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_303c65f7c3f945a886655c66cf062719f000.webp)
What is BYOD (Bring Your Own Device)?
BYOD is a term used to describe the practice of employees bringing their own personal devices to work and using them for work purposes.
1 view
![](https://static.wixstatic.com/media/84441c_7eceac1684f14188841b125c5159223af000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_7eceac1684f14188841b125c5159223af000.webp)
![What is a Rootkit ?](https://static.wixstatic.com/media/84441c_7eceac1684f14188841b125c5159223af000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_7eceac1684f14188841b125c5159223af000.webp)
What is a Rootkit ?
Rootkit is a type of malicious software that gives the attacker a privileged position on the system.
2 views
![](https://static.wixstatic.com/media/84441c_01069760985b497a8235aeb63ba7adc1f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_01069760985b497a8235aeb63ba7adc1f000.webp)
![What is An IP address?](https://static.wixstatic.com/media/84441c_01069760985b497a8235aeb63ba7adc1f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_01069760985b497a8235aeb63ba7adc1f000.webp)
What is An IP address?
An IP address is a unique number that is assigned to devices on the internet. It is like a street address for your home.
1 view
![](https://static.wixstatic.com/media/84441c_34ed8be2fb394d56b490fdfb1c981616f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_34ed8be2fb394d56b490fdfb1c981616f000.webp)
![What is spoofing?](https://static.wixstatic.com/media/84441c_34ed8be2fb394d56b490fdfb1c981616f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_34ed8be2fb394d56b490fdfb1c981616f000.webp)
What is spoofing?
Spoofing can take various forms, including IP address spoofing, email spoofing, caller ID spoofing, and website spoofing.
7 views
![](https://static.wixstatic.com/media/84441c_faea6583e5e44249b91f21b89dab9a27f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_faea6583e5e44249b91f21b89dab9a27f000.webp)
![What is the cloud / cloud storage?](https://static.wixstatic.com/media/84441c_faea6583e5e44249b91f21b89dab9a27f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_faea6583e5e44249b91f21b89dab9a27f000.webp)
What is the cloud / cloud storage?
The cloud is a way of storing data and accessing it from any device. It is a network of remote servers.
5 views
bottom of page