A security solution that allows organizations to specify what software is allowed to run on their systems, in order to prevent any nonwhitelisted processes or applications from running.
A third party organization that provides a range of IT services, including networking, infrastructure and IT security, as well as technical support and IT administration.
A list of all IT hardware and devices an entity owns, operates or manages. Such lists are typically used to assess the data being held and security measures in place on all devices.
Encryption involves scrambling data using cryptographic techniques so that it can only be read by someone with a special key. When encryption is enabled, a device’s hard drive will be encrypted while the device is locked, with the user’s passcode or password acting as the special key.
The collection and analysis of data from open source intelligence (OSINT) and dark web sources to provide organizations with intelligence on cyber threats and cyber threat actors pertinent to them.
Where sensitive data is encrypted while it is stored in databases. If implemented correctly, this can stop malicious actors from being able to read sensitive data if they gain access to a database.
Where a user authenticates themselves through two different means when remotely logging into a computer system or web based service. Typically a password and a passcode generated by a physical token device or software are used as the two factors.
Software that can identif y if sensitive data is being exfiltrated from a network or computer system.
A system, utilizing software, hardware or a combination of the two, that constantly monitors an organization’s network for performance and security issues.
Hardware or cloud based solutions used to filter out malicious traffic associated with a DDoS attack, while allowing legitimate users to continue to access an entity’s website or web-based services.
Software or hardware solutions that combines traditional firewall technology with additional functionality, such as encrypted traffic inspection, intrusion prevention systems and anti-virus.
An internet protocol used to combat email spoofing – a technique used by hackers in phishing campaigns.
Authorized simulated attacks against an organization to test its cyber security defences. May also be referred to as ethical hacking or red team exercises.
A specific technique to block access to known bad IP addresses by users on your network.
Hardware solutions used to control and monitor network traffic between two points according to predefined parameters.
Software used to scan an organization’s inbound and outbound email messages and place them into different categories, with the aim of filtering out spam and other malicious content.
Security info & event management (SIEM)
System used to aggregate, correlate and analyze network security information – including messages, logs and alerts – generated by different security solutions across a network.
Training programmes designed to increase employees’ security awareness. For example, programmes can focus on how to identif y potential phishing emails.
Security Operations Centre (SOC)
Endpoint detection and response (EDR)
A software tool that works by monitoring and collecting data from endpoints and recording the information in a central database where further analysis, detection, investigation, reporting and alerting take place.
A facility that houses an information security team responsible for monitoring and analysing an organization’s security posture on an ongoing basis. The SOC team’s goal is to detect, analyze and respond to cybersecurity incidents using a combination of technology solutions and a strong set of processes. SOC’s can be internal and run by the organization themselves or outsourced to a third party.
Software installed on individual computers (endpoints) that uses behavioral and signature based analysis to identif y and stop malware infections.
A VPN is an encrypted connection over the internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely transmitted. Most commonly used to provide a secure remote connection to an organization’s network.
Action plans for dealing with cyber incidents to help guide an organization’s decision-making process and return it to a normal operating state as quickly as possible.
Automated tests designed to probe computer systems or networks for the presence of known vulnerabilities that would allow malicious actors to gain access to a system.
A security solution that monitors activity on computer systems or networks and generates alerts when signs of compromise by malicious actors are detected.
Protects web facing servers and the applications they run from intrusion or malicious use by inspecting and blocking harmful requests and malicious internet traffic.
CFC Underwriting Limited is Authorized and Regulated by the Financial Conduct Authority
The filtering of certain web pages or web services that are deemed to pose a potential security threat to an organization. For example, known malicious websites are typically blocked through some form of web content filtering. © 1999-2022 CFC Underwriting Ltd, All Rights Reserved