Featured terms

Useful starting points for understanding everyday cyber risk.

Security Operations

a backup

A protected copy of important data that can support recovery after loss or attack.

Network Security

a firewall

A control that allows or blocks network traffic between devices, networks, and the internet.

Risk & Compliance

a vulnerability

A weakness in software, configuration, process, or behaviour that could be exploited.

Security Operations

an asset inventory

A practical list of devices, accounts, systems, services, and data locations the business relies on.

Risk & Compliance

an attack surface

The accounts, systems, services, devices, and people attackers could try to target.

Web & Application Security

broken access control

When users can access data or functions that should be restricted.

Risk & Compliance

cyber risk

The chance that a cyber event could cause financial loss, downtime, data exposure, or disruption.

Security Operations

endpoint protection

Security protection for laptops, desktops, and servers against suspicious activity or malware.

Incident Response

incident response

The structured process of containing, investigating, and recovering from a cyber incident.

Malware & Ransomware

malware

Malicious software designed to steal information, disrupt systems, spy on users, or give attackers access.

Passwords & Access

multi-factor authentication

An extra sign-in check that helps protect accounts even if a password is stolen.

Network Security

network segmentation

Separating systems into network zones to reduce spread and limit access.

Security Operations

patch management

Keeping software, devices, and systems updated to reduce known weaknesses.

Penetration Testing

penetration testing

An authorised security test that looks for realistic ways systems or applications could be exploited.

Email & Fraud

phishing

Fake messages that trick people into clicking links, opening attachments, or giving away sensitive information.

Malware & Ransomware

ransomware

Malware that locks or encrypts files and demands payment before access is restored.

Incident Response

recovery in incident response

Restoring safe business operations after containment and investigation.

Web & Application Security

remote code execution

A serious weakness where an attacker may cause a system to run unauthorised commands or code.

Security Operations

secure configuration

Setting systems up safely instead of relying on risky defaults.

Web & Application Security

SQL injection

A web application weakness where unsafe input can interfere with database queries.