A-C
Advanced Persistent Threat (APT)
Sophisticated, long-term cyberattack where hackers gain access to networks and remain hidden for months or years, stealing data continuously.
Backup
Copies of your important data stored separately from your main systems. Your lifeline when ransomware, hardware failure, or accidents strike.
Botnet
Network of compromised computers controlled remotely by cybercriminals, often used to launch large-scale attacks or send spam.
Business Email Compromise (BEC)
Sophisticated scam where criminals impersonate executives or suppliers to trick employees into transferring money or revealing sensitive information.
Cloud Security
Protection measures for data, applications, and services stored in cloud platforms like Microsoft 365, Google Workspace, or Amazon Web Services.
Compliance
Following cybersecurity laws and regulations relevant to your industry, such as GDPR for data protection or PCI DSS for payment processing.
Cyber Essentials
UK government-backed cybersecurity certification that demonstrates your business has essential security measures in place.
Cybersecurity
The practice of protecting computer systems, networks, and data from digital attacks, theft, and damage. Every business needs a cybersecurity strategy.