Support & Downloads

Quisque actraqum nunc no dolor sit ametaugue dolor. Lorem ipsum dolor sit amet, consyect etur adipiscing elit.

s f

Contact Info
198 West 21th Street, Suite 721
New York, NY 10010
+88 (0) 101 0000 000
Follow Us

FAQ Page

What is Cybersecurity?

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information and extorting money from users via ransomware or interrupting normal business processes.

I am safe. I have my data on the Cloud and an Antivirus - EDR installed.

Nice. These are useful tools and backing up your data on the cloud helps.

Unfortunately that is not enough to keep you safe. 82% of all the attacks where on networks that used the cloud at some form.

An Antivirus - EDR can help with specific threats only.

What is the job of a Cybersecurity Analyst?

Cybersecurity, as mentioned, is a practice. That means we constantly monitor your network and react to every change. 

For a better understanding think about this: If you had all the necessary medical tools available to you, could you do the work of a doctor?

A doctor is using these tools  and his training to determine if something is a threat to your health.

Similarly a Cybersecurity Analyst uses every tool available to him to determine if something is a threat to your network and your data. 

I don't think I need to worry about penalties .

That is not accurate. From 2018 to 2021 there were 11.000.000 euros in fines (in Greece) and way more across the EU. The number of attacks is only increasing.

If someone is in my network I think i'll know it.

The average time to identify a breach is 200 days. If there is no active monitoring of a network by a Cybersecurity Analyst it is almost impossible to detect a breach.

You will notice it only if the attacker wants to destroy your network or extort you for money.

My computer tech guy says that I have "Cybersecurity".

Well this is just misinformation. Our job is different from an IT's. We are daily watching a network to make sure nothing suspicious is going on.

IT is a great partner though and we guide them so we can both, as a team, keep you safe.

What is phishing?

Phishing is the use of digital communications to trick people into revealing sensitive data or deploying malicious software. 

What is Business Email Compromise (BEC)?

A threat actor sends an email message that seems to be from a known source to make a seemingly legitimate request for information, in order to obtain a financial advantage.

What is Malware?

Malware is software designed to harm devices or networks. There are many types of malware. The primary purpose of malware is to obtain money, or in some cases, an intelligence advantage that can be used against a person, an organization, or a territory. 

What is Ransomware?

A malicious attack where threat actors encrypt an organization's data and demand payment to restore access. 

What is Social engineering?

Social engineering is a manipulation technique that exploits human error to gain private information, access, or valuables. Human error is usually a result of trusting someone without question. It’s the mission of a threat actor, acting as a social engineer, to create an environment of false trust and lies to exploit as many people as possible. 

What is General Data Protection Regulation (GDPR)?

GDPR is a European Union (E.U.) general data regulation that protects the processing of E.U. residents’ data and their right to privacy in and out of E.U. territory. For example, if an organization is not being transparent about the data they are holding about an E.U. citizen and why they are holding that data, this is an infringement that can result in a fine to the organization. Additionally, if a breach occurs and an E.U. citizen’s data is compromised, they must be informed. The affected organization has 72 hours to notify the E.U. citizen about the breach.

What is Payment Card Industry Data Security Standard (PCI DSS)?

PCI DSS is an international security standard meant to ensure that organizations storing, accepting, processing, and transmitting credit card information do so in a secure environment. The objective of this compliance standard is to reduce credit card fraud. 

Do You Have Any Question?