Category: A to Z


  • P is for …

    Password There has been much written about passwords, but for this entry I thought it worth defining what a password… READ MORE

  • O is for …

    On-premise This term is used to describe equipment which is physically located in your offices. The alternative would be a… READ MORE

  • N is for …

    Network This is an often used phrase, but what exactly is a network? In its simplest form, it is several… READ MORE

  • M is for …

    MacOS This is the Operating System used by Apple Macintosh desktop computers, not to be confused with that used by… READ MORE

  • K is for…

    Keeping it Simple OK, so this isn’t strictly a security term, but it is hugely important. Do the simple things… READ MORE

  • J is for…

    JML – Joiners, movers and leavers This is an often overlooked component of security, but it’s very important. As the… READ MORE

  • I is for…

    Integrity Along with confidentiality and availability, integrity makes up what is known as the CIA triad, the three main pillars… READ MORE

  • H is for…

    Hacking I’m pretty sure that you’ve all heard the term “hacking”, and you probably know that it has negative connotations.… READ MORE

  • G is for…

    GDPR The General Data Protection Regulation (GDPR) is an EU regulation which sets out the minimum requirements for Data Protection… READ MORE

Quote of the week

“Security is always excessive until it’s not enough.”
Robbie Sinclair