Tel: 03333 200 222
Email: [email protected]

Blog

Browse the latest news and opinions from the business communications world.
Filter by:
SIEM in cyber security
06/01/2023
Cyber Security

What is SIEM in cyber security?

Security information and event management (SIEM) technology supports threat detection compliance and security incident management through the collection and analysis of both real-time and historical of security events, as well as a wide variety of other event and contextual data sources.
Full article
right-chevron
Risk Management in cyber security
06/01/2023
Cyber Security

What is Risk Management in cyber security? 

Cybersecurity risk management identifies, assesses, and mitigates risks to an enterprise's electronic information and systems, including implementing security controls to prevent cyber threats.
Full article
right-chevron
Residual Risk in cyber security
06/01/2023
Cyber Security

What is the Residual Risk in cyber security?

Risk can be divided into 2 parts which are inherent risk and residual risk. Inherent risk is the risk you start with before you take any action to control it. If you take no controlling action and the risk is the inherent risk.
Full article
right-chevron
Phishing in cyber security
06/01/2023
Cyber Security

What is Phishing in cyber security?

Phishing is a method of trying to gather personal information using deceptive e-mail and websites. The goal of phishing is to trick an email recipient into revealing sensitive information like passwords and payment information.
Full article
right-chevron
Pretexting in cyber security
06/01/2023
Cyber Security

What is Pretexting in cyber security?

“Have you ever received a scam email?” If yes, then understand that someone is trying to make you prey on pretext which is very common in social engineering nowadays.
Full article
right-chevron
Pharming in cyber security
06/01/2023
Cyber Security

What is Pharming in cyber security?

Pharming is a technique where attackers try to redirect website traffic from a legitimate website to a fraudulent website with the purpose of spreading malware or stealing sensitive data from victims.
Full article
right-chevron
integrity in cyber security
06/01/2023
Cyber Security

What is Integrity in cyber security?

Confidentiality, Integrity and Availability, known as the CIA triad, is a model developed to guide information security policy within an organization.
Full article
right-chevron
CVE in cyber security
05/01/2023
Cyber Security

What is CVE in cyber security?

Common Vulnerabilities and Exposures (CVE) is a database of publicly disclosed information security issues and it includes a series of numbers called CVE numbers which uniquely identifies vulnerabilities from the list.
Full article
right-chevron
Baiting in cyber security
05/01/2023
Cyber Security

What is Baiting in cyber security?

Baiting in cyber security is similar to phishing in many ways; it is a simple but effective type of social engineering attack.
Full article
right-chevron
Patching in cyber security
05/01/2023
Cyber Security

What is Patching in cyber security?

Patches are modifications to software code that often come from a security developer to fix security problems or technical issues. Most of the time, a security patch is released after victims are already trapped by hackers due to a vulnerability.
Full article
right-chevron
1 2 3 4 5 6

Related Resources

grey-tick-icon
Trusted by 100s of businesses already
grey-tick-icon
Uniquely tailored approach
grey-tick-icon
Outstanding customer service
swift-tag

Talk with us

We pride ourselves on being an honest trustworthy business communications provider
phone-icon
Telephone
Call 03333 200 222 or if you would prefer us to call you.
Schedule a call
email-icon
Email
We love emails, to send us one use [email protected] or fill in our
Contact Form
chat-icon
Live Chat
Got a question? Our live chat is open and ready to assist
Chat Now
Contact a specialist
crosschevron-down