Archives: Glossary

Whaling

Definition: a targeted phishing campaign that targets high-profile individuals (or “whales”) such as top executives, government officials, or celebrities.
Read more

Whale

Definition: high-profile individuals who are valuable targets for cyber-attacks. These individuals often have access to sensitive data, large amounts of money, or have decision-making authority.
Read more

Virus

Definition: malware that can self-replicate and spread from one computer to another by attaching themselves to host files.
Read more

Vulnerability

Definition: a weakness in a security system that can be exploited or triggered by a threat source.
Read more

Vulnerability scanning

Definition: this refers to the scanning of systems to check for any vulnerabilities found within our common vulnerabilities and exposures list.
Read more

User Access Control (UAC)

Definition: a system that regulates who is authorised to enter a computer system, as well as what actions they are authorised to make within the system.
Read more

United Kingdom Accreditation Service (UKAS)

Definition: the government-backed national accreditation body for the United Kingdom. They assess and accredits organisations providing certification, testing, inspection and calibration services against internationally agreed standards.
Read more

Trojan

Definition: a type of malware that is disguised as legitimate software.
Read more

Threat profile

Definition: a detailed overview of the threats and weaknesses to your business, allowing for effective remediation management.
Read more

The Onion Router (TOR)

Definition: a browser which allows you to access .onion links, enabling (almost) anonymous communication
Read more