BlackFog Logo

Cybersecurity 101

A B C D E F G H I K M N O P R S T U V W Z

Identity Theft

Identity theft is commonly defined as when someone takes someone else's information, without the individual's knowledge or permission, and then uses it for their own benefit.

2023-07-06T08:14:45+01:00July 6th, 2023|

Incident Response Plan

An incident response plan is documentation of a pre-determined set of instructions or procedures to detect, respond to and limit the consequences of a data breach or other form of security incident.

2023-07-06T08:15:10+01:00July 6th, 2023|

Insider Threat

An insider threat is a security risk that originates from within the target organization usually involving employees, vendors, executives, contractors or anyone else who works within the business. The risk posed by those who have access to an organization's physical or digital assets. These attacks are dangerous as they are hard to detect until [...]

2022-09-23T21:53:32+01:00September 21st, 2022|

Intellectual Property (IP)

Intellectual property (IP) is any type of design, invention, logo, symbol, image or name that it used by an organization in commerce. IP is a valuable asset that is protected to enhance an organization's competitive advantage in the marketplace.

2023-03-07T16:50:26+00:00March 7th, 2023|

IOT

The Internet of Things (IOT) describes a network of physical devices, that have unique identifiers and are embedded with sensors, software and other technologies, enabling them to connect and exchange data with other devices and systems over the internet.

2023-07-05T15:03:39+01:00July 5th, 2023|

IP Address

An Internet Protocol address, or IP address, is a unique numerical identifier assigned to every device connected to the Internet or a network. Computers use IP addresses to allow information to be sent between two devices on a network, on the Internet or on other networks.

2023-07-05T15:02:33+01:00July 5th, 2023|

Title