Endpoints

Endpoints What is an endpoint? In cybersecurity and IT, endpoints refer to any device that connects to a network and communicates with other systems. These devices serve as entry points for users and, potentially, for cyber threats. Because they interact directly with networks and data, endpoints are critical components of an organisation’s digital infrastructure—and key targets […]

SIEM – Security Information and Event Management

SIEM – Security Information and Event Management What is it? A SIEM, or Security Information and Event Management, is a cybersecurity solution that provides real-time analysis of security alerts generated by applications and network hardware. It combines two key functions: Security Information Management (SIM): Collects, stores, and analyses historical data from logs and events. Security Event Management […]

MSSP or Managed Security Service Provider

MSSP – Managed Security Service Provider What is an MSSP? An MSSP, or Managed Security Service Provider, is a third-party company that delivers outsourced monitoring and management of security systems and devices. MSSPs help organisations protect their digital assets by providing a range of cybersecurity services, often on a subscription basis. These services are especially valuable for […]

QR Phishing – Quishing

QR Phishing – Quishing What is it and how can we defend against it. QR phishing, also known as quishing, is a type of cyberattack where attackers use QR codes to trick victims into visiting malicious websites or downloading harmful content. As QR codes have become more popular for contactless transactions, menus, and quick access to websites, cybercriminals […]

Email Spam

Email Spam What is it and how can we defend against it. Email spam, also known as junk email, refers to unsolicited and often irrelevant or inappropriate messages sent over email, typically to a large number of users. These messages are usually sent for advertising, phishing, spreading malware, or other malicious purposes. Spam emails can clutter […]

Cybersecurity

Cybersecurity What is it? Cybersecurity is the practice of protecting computer systems, networks, and data from digital threats such as unauthorised access, cyberattacks, and data breaches. It plays a critical role in safeguarding sensitive information, ensuring business continuity, and maintaining trust in digital systems. As our reliance on technology grows, so does the importance of cybersecurity […]

Spoofing

Spoofing What is it and how can we defend against it. Spoofing is a deceptive tactic used in cybersecurity where an attacker disguises themselves as a trusted source to gain access to sensitive information, spread malware, or manipulate systems. The goal of spoofing is to trick victims into believing that the communication or source is legitimate, […]

PUPs

PUPs What are they? PUPs stands for Potentially Unwanted Programs. These are software applications that a user may not want on their computer, even if they are not inherently malicious. They often come bundled with other software and can be installed without the user’s full understanding or consent. Common characteristics of PUPs: Bundled software: Installed alongside free […]

Red Teaming

Red Teaming What is it? Red Teaming in cybersecurity is a full-scope, multi-layered attack simulation designed to measure how well an organisation’s people, networks, applications, and physical security can withstand an attack from a real-world adversary. Key Objectives: Test detection and response capabilities Identify exploitable vulnerabilities Assess the effectiveness of security controls Improve incident response and […]

Black Swan Events

Black Swan Events What are they? A Black Swan event is a metaphor used to describe an event that is extremely rare, has a severe impact, and is often only explainable in hindsight. The term was popularised by Nassim Nicholas Taleb in his 2007 book The Black Swan: The Impact of the Highly Improbable. These events challenge our assumptions […]