top of page
Cyber information Videos
![](https://static.wixstatic.com/media/84441c_b438e124e54b4a4488eb0761c7d16414f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_b438e124e54b4a4488eb0761c7d16414f000.webp)
![What is a Cyber Attack?](https://static.wixstatic.com/media/84441c_b438e124e54b4a4488eb0761c7d16414f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_b438e124e54b4a4488eb0761c7d16414f000.webp)
What is a Cyber Attack?
A cyber attack is an attempt to disrupt, deny, degrade, or destroy information resident in computers and computer networks.
4 views
![](https://static.wixstatic.com/media/84441c_d5d5c5267ae441e3abf42eca6fd828f9f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_d5d5c5267ae441e3abf42eca6fd828f9f000.webp)
![What is Pen-testing?](https://static.wixstatic.com/media/84441c_d5d5c5267ae441e3abf42eca6fd828f9f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_d5d5c5267ae441e3abf42eca6fd828f9f000.webp)
What is Pen-testing?
Pen-testing is the process of analysing a system to detect security flaws and vulnerabilities.
4 views
![](https://static.wixstatic.com/media/84441c_303c65f7c3f945a886655c66cf062719f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_303c65f7c3f945a886655c66cf062719f000.webp)
![What is BYOD (Bring Your Own Device)?](https://static.wixstatic.com/media/84441c_303c65f7c3f945a886655c66cf062719f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_303c65f7c3f945a886655c66cf062719f000.webp)
What is BYOD (Bring Your Own Device)?
BYOD is a term used to describe the practice of employees bringing their own personal devices to work and using them for work purposes.
1 view
bottom of page