|
Zero Day The time taken between a vulnerability existing and a patch being released to fix it can be several weeks, months… READ MORE
|
Yottabyte You may not be too familiar with this term, but you will be within the next year or so… READ MORE
|
X-rated It’s well known that the internet hosts a wide variety of pornography sites, from the legal on the surface… READ MORE
|
Whaling When people launching spear phishing attacks against senior members of staff, this is known as whaling (because they’re after… READ MORE
|
Updates This is just another term for patches, and is pretty much used interchangably. So these are fixes for parts of… READ MORE
|
Tailgating Tailgating is very easy to spot. It’s when you follow someone through a barrier without swiping your entry card,… READ MORE
|
Quantum computing You probably know by now that typical computers function by using 1s and 0s, using binary maths. The… READ MORE
“Security is always excessive until it’s not enough.”
— Robbie Sinclair
This site exists to make cybersecurity understandable for everyone. Whether you’re running a small business, working in a non‑technical role, or just trying to stay safe online, this site breaks down complex topics into plain English you can actually use. No jargon, no scare tactics – just practical guidance based on decades of real‑world experience.