Security Explained

We've got your back. Let's give you the basics on how you can be best protected against hackers online. 

Got a question? Let's chat

Setting yourself up for success

Securing your set-up

Multi-Factor Authentication 

Using Multi-Factor Authentication is an effective and straightforward way to enhance your cyber security. By using an alternate device to confirm your identity when accessing your system you can spread your eggs into more than one basket and add another hurdle for any hackers to face when attempting to attack.

Your Password

Protect your password by keeping it private, changing it on a regular basis, and creating a strong code. You can use tools such as 1password to help you remember, create and protect your passwords.  

Keep your guard up

Question the source of your email 

Remain cautious when responding to emails at all times, even if the sender looks like someone you know. Often, scammers will pose as your colleague and make a request to transfer money, buy a gift voucher or open an attachment. If at all concerned, speak to your colleague face to face before continuing to ensure the email is genuine.

Invest in Anti-Virus and stay up-to-date 

Keeping your system up to date with virus protection adds another barrier between your precious resources and a potential hacker. The more barriers you can put up and the less vulnerabilities your system has, the better protected you can be and your chances of being targeted decrease.

Your Tech Glossary


is a type of cyber attack that targets user data such as log-in info and credit card numbers. An attacker will often act as a known identity to the victim via email or text. 


is a term that covers all kinds of malicious software designed to cause damage to your system; including viruses, ransomware, and trojans.


describes a type of script that performs tasks on command allowing a hacker to take complete remote control of an affected computer.


is a process of encoding data to protect it from criminals by only being made accessible through use of a key.

VPN [Virtual Private Network]

allows users to remain anonymous while using the internet by hiding their location and encrypting traffic.


comes in the form of hardware and software and is designed to keep hackers and viruses out.


is a form of malware that spies on user activity without their knowledge in order to gather their confidential information through collecting keystrokes, data harvesting, and monitoring activity over time.

Pen Testing

short for Penetration Testing, involves reviewing the security of a system through the use of hacker tools and techniques to spotlight vulnerabilities and areas of improvement.