Antivirus software has evolved dramatically over the years to provide consumers greater access to the type of security their device needs. It’s still designed to remove nasty viruses and malicious malware, but well-known brands such as McAfee face greater competition from free, multi-device ready products such as Avast and AVG.
One of the newer threats to your online security. Botnet is a network of infected devices operated from a secure location with one primary goal; to commit co-ordinated and often deadly cyber-attacks.
Bring Your Own Device is a strategy several businesses are adopting to encourage employees to use their own devices during working hours.
Your one-stop storage facility to safely upload, save and download content anywhere in the world. The benefit of a cloud-based storage systems means if you need to access documentation away from the office, you can do so without having to physically be at your desk.
You’ll have seen them in the news as they become more common. Cyber attacks seek to gain malicious and unauthorised access on all devices to steal valuable information. Be aware!
Your online shield against malicious cyber attacks. Good cyber security will not only protect your devices, it will block attempts to steal your online data. We recommend you invest in good cyber security for any devices you use to access the internet.
(DoS) for short, commonly appears when there are legitimate efforts from employees to access computer files or services. DoS is also a good deterrent against cyber hacking i.e. unwarranted attempts to access secure files.
Your online activity and how its recorded. Your digital footprint is everything from your social media presence to reviews you have left on TripAdvisor. Be aware of your security settings. It’s remarkably easy to build a picture of who you are for somebody else to steal your online identity without knowing you are doing it.
Protecting your information in a way that only those authorised to access it can do. It is a secure way of ensuring your data is only readable to you (and anyone with expressed permission).
This is a collective term for any device that connect to an organisation’s network.
The best-known way of controlling your network’s traffic. Unauthorised access will be blocked, and you can amend the firewall’s security level via a traffic light system in the settings. Again, firewalls have come a long way since the development of desktop only versions.
IoT is the use of everyday objects i.e. cameras, fridges and printers that are connected to your internet network.
A programme designed to access everyday applications such as Microsoft Office.
Updating your online security. Patching is designed to keep on top of your software’s security and improve general functionality.
Phishing is an email that contains harmful content and links. Phishing has become a real threat to our cyber security due to its chameleon-style attacks.
Malicious software that locks your computer demanding a payment. Commonly seen if you have downloaded a programme without appropriate cyber security.
This is central hub for consumers set up by a business to allow the consumer access to their applications via the internet.
Social engineering occurs when you are asked to carry out a specific action or answer a question that is of use to a hacker.
A more specific harmful email that will appear genuine i.e. from your bank.
Trojans come in various forms, malware and as a virus, and come in disguise imitating legitimate software hoping to hack your information.
The use of two separate components to verify your identity. Typically paired with a mobile device, a user is required to enter their normal credentials followed by a code generated from an “app” installed on the mobile phone, such as the Google Authenticator App.
Very targeted Phishing usually aimed at senior figures.