top of page
Cyber information Videos
![](https://static.wixstatic.com/media/84441c_4a23a78573c2447cb61514acf00dd5eef000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_4a23a78573c2447cb61514acf00dd5eef000.webp)
![What is Multi-Factor Authentication?](https://static.wixstatic.com/media/84441c_4a23a78573c2447cb61514acf00dd5eef000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_4a23a78573c2447cb61514acf00dd5eef000.webp)
What is Multi-Factor Authentication?
This method of authentication requires the user to provide two or more pieces of information in order to log in.
5 views
![](https://static.wixstatic.com/media/84441c_d5d5c5267ae441e3abf42eca6fd828f9f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_d5d5c5267ae441e3abf42eca6fd828f9f000.webp)
![What is Pen-testing?](https://static.wixstatic.com/media/84441c_d5d5c5267ae441e3abf42eca6fd828f9f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_d5d5c5267ae441e3abf42eca6fd828f9f000.webp)
What is Pen-testing?
Pen-testing is the process of analysing a system to detect security flaws and vulnerabilities.
4 views
![](https://static.wixstatic.com/media/84441c_303c65f7c3f945a886655c66cf062719f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_303c65f7c3f945a886655c66cf062719f000.webp)
![What is BYOD (Bring Your Own Device)?](https://static.wixstatic.com/media/84441c_303c65f7c3f945a886655c66cf062719f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_303c65f7c3f945a886655c66cf062719f000.webp)
What is BYOD (Bring Your Own Device)?
BYOD is a term used to describe the practice of employees bringing their own personal devices to work and using them for work purposes.
1 view
![](https://static.wixstatic.com/media/84441c_7eceac1684f14188841b125c5159223af000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_7eceac1684f14188841b125c5159223af000.webp)
![What is a Rootkit ?](https://static.wixstatic.com/media/84441c_7eceac1684f14188841b125c5159223af000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_7eceac1684f14188841b125c5159223af000.webp)
What is a Rootkit ?
Rootkit is a type of malicious software that gives the attacker a privileged position on the system.
2 views
bottom of page