SOAR – Security Orchestration Automation and Response

SOAR – Security Orchestration, Automation and Response What is it? Security Orchestration, Automation and Response (SOAR) refers to a category of tools and technologies that help security teams manage and respond to threats more efficiently by integrating various security systems and automating routine tasks. Here’s how it works: SOAR platforms are designed to streamline security operations by […]

MFA – Multi Factor Authentication

MFA – Multi Factor Authentication What is it? MFA, or Multi-Factor Authentication, is a security process that requires users to provide two or more verification factors to gain access to a system, application, or account. It adds an extra layer of protection beyond just a username and password, making it significantly harder for unauthorised users to gain […]

IoT – Internet of Things

IoT – the Internet of Things What is it? The Internet of Things (IoT) refers to a network of physical objects—“things”—that are embedded with sensors, software, and other technologies to connect and exchange data with other devices and systems over the internet. These “things” can range from everyday household items to sophisticated industrial tools. What makes a […]

EDR – Endpoint Detection and Response

EDR – Endpoint Detection and Response What is it? EDR, or Endpoint Detection and Response, is a cybersecurity solution designed to monitor, detect, investigate, and respond to threats on endpoints—which include devices like laptops, desktops, servers, and mobile devices. EDR tools provide advanced protection beyond traditional antivirus software by focusing on identifying and mitigating sophisticated threats that […]

Endpoints

Endpoints What is an endpoint? In cybersecurity and IT, endpoints refer to any device that connects to a network and communicates with other systems. These devices serve as entry points for users and, potentially, for cyber threats. Because they interact directly with networks and data, endpoints are critical components of an organisation’s digital infrastructure—and key targets […]

SIEM – Security Information and Event Management

SIEM – Security Information and Event Management What is it? A SIEM, or Security Information and Event Management, is a cybersecurity solution that provides real-time analysis of security alerts generated by applications and network hardware. It combines two key functions: Security Information Management (SIM): Collects, stores, and analyses historical data from logs and events. Security Event Management […]

MSSP or Managed Security Service Provider

MSSP – Managed Security Service Provider What is an MSSP? An MSSP, or Managed Security Service Provider, is a third-party company that delivers outsourced monitoring and management of security systems and devices. MSSPs help organisations protect their digital assets by providing a range of cybersecurity services, often on a subscription basis. These services are especially valuable for […]

QR Phishing – Quishing

QR Phishing – Quishing What is it and how can we defend against it. QR phishing, also known as quishing, is a type of cyberattack where attackers use QR codes to trick victims into visiting malicious websites or downloading harmful content. As QR codes have become more popular for contactless transactions, menus, and quick access to websites, cybercriminals […]

Email Spam

Email Spam What is it and how can we defend against it. Email spam, also known as junk email, refers to unsolicited and often irrelevant or inappropriate messages sent over email, typically to a large number of users. These messages are usually sent for advertising, phishing, spreading malware, or other malicious purposes. Spam emails can clutter […]

Cybersecurity

Cybersecurity What is it? Cybersecurity is the practice of protecting computer systems, networks, and data from digital threats such as unauthorised access, cyberattacks, and data breaches. It plays a critical role in safeguarding sensitive information, ensuring business continuity, and maintaining trust in digital systems. As our reliance on technology grows, so does the importance of cybersecurity […]