FAQs
Cyber Security
- What is the Dark Web?
- What is Ethical Hacking?
- What is a Phishing attack?
- What is a Man-in-the-Middle (MITM) Attack?
- What is Social Engineering?
- What is Malware?
- What should I do if I get a data breach?
- What is Ransomware?
- What is penetration testing?
- What is a brute force attack?
- Can I get help with a data breach?
- What cyber security laws are relevant to UK organisations?
- Are UK Company Directors personally liable for a data breach?
- What is data loss prevention (DLP)?
- How do I implement threat detection?
- What is Managed Threat Response (MTR)?
- How do I keep my email safe from cyber threats?
- What is the Recovery Point Objective (RPO)?
- What is Recovery Time Objective (RTO)?
- What is Vulnerability Management?
- How do I secure my website?
- What is EntraID?
- What is Multi Factor Authentication (MFA)?
- What is Role Based Access (RBAC)?
- What is a Firewall?
- What is an Insider Threat?
- How to secure a Wireless Network?
- What are the benefits of a password management solution?
- How do I ensure that my data is secure in the Cloud?
- What is Defence in Depth?
- What is a Zero Trust Security Strategy?
- What is Endpoint Protection?
- What is identity and access management (IAM)?
- How to create a good Business Continuity Plan (BCP)?
- How to create a Disaster Recovery Plan (DRP)?
- Should I encrypt my workstations?
- What is the Principle of Least Privilege?
- What is a Virtual Private Network (VPN)?
- What is the purpose of an Information Security Policy?
- What is the best Password Policy?
- How do I protect my backups?
- How to do security assurance on my supply chain?
- How do I Anonymise Personal Data?
- What is a Non-Disclosure Agreement (NDA)?
- What is the Purpose of an Acceptable Use Policy (AUP)?
- Why do I have to complete Security Questionnaires?
- What is a good Cyber Resilience Strategy?
- What is a Secure Operations Centre (SOC)?
- Why do I need an Access Control Policy?
- What is needed to protect my network from a cyber attack?
- What are the security features of the Microsoft Business Standard license?
- What are the security features of the Microsoft E3 license?
- What are encryption keys ?
- How does Azure keep data safe?
- How does AWS keep data safe?
- What security considerations apply to remote working?
- Is a Mac more secure than a Windows based device?
- What is the purpose of data classification?
- How do I assess my risk of a cyber attack?
- How do I get cyber security insurance?
- What is a Zero-Day attack?
- What are password management tools used for?
- What are DBS checks?
- What are the basic security requirements when onboarding new staff?
- What is a good source of cyber security news?
- What are the security features included in the Microsoft Business Basic license?
- What are the security features of the Microsoft Business Premium license?
- What are the security features of the Microsoft E5 license?
- How is security implemented in the development life cycle?
- What is Privileged Account Management (PAM)?
- What is Microsoft Intune and what are the key security features?
- How can I see if my data is exposed on the Dark Web?
- What happens when software goes out of support?
Standards and Legislation
- Why is Cyber Security important?
- What are the NIST standards?
- What is HIPAA Compliance?
- What is Cyber Essentials?
- What is SOC 2.0?
- What is PCI DSS Compliance?
- What is GDPR?
- What is DORA?
- What are secure development standards?
- What is TOGAF?
- What does data protection law expect organisations to do with regards to Cyber Security?
- Is security awareness training mandatory for all staff?
- What are the reporting requirements in the event of a data breach in the UK and EU?
- Do I legally need to have a Data Protection Officer (DPO)?
- What is the best certification? Cyber Essentials or ISO 27001?
- Do I legally have to have an Incident Management Plan?
- What is ISO 27001?