BlackFog Logo

Cybersecurity 101

A B C D E F G H I K M N O P R S T U V W Z
En Et Ex

Encryption

Encryption is the conversion of data from a readable format into an encoded (encrypted) format. A key or password is required to decrypt the data in order to read or process it. This can be used in cyberattacks such as ransomware but can also be used as a security technique to protect digital data [...]

2023-03-07T16:48:57+00:00March 7th, 2023|

Endpoint Detection and Response (EDR)

Endpoint Detection and Response (EDR) is an endpoint security solution that is used to continuously detect, investigate and respond to cyberthreats. These solutions use data collected from endpoint devices to understand how cyberthreats behave and the ways that organizations respond to the cyberthreats.

2023-03-07T16:44:22+00:00March 7th, 2023|

Endpoint Protection

Endpoint protection is an approach to protect endpoints or entry points of end-user devices such as desktops, laptops and mobile devices from being exploited by malicious actors and campaigns.

2023-07-06T08:17:31+01:00July 6th, 2023|

Title