Tips & Advice

Security Monitoring

What Is Internet Security?

Internet security relies on specific resources and standards for protecting data that gets sent through the Internet. This includes various kinds of encryption, such as Pretty Good Privacy (PGP). Other aspects of a secure Web setup includes firewalls, which block unwanted traffic, and anti-malware, anti-spyware and anti-virus programs that work from specific networks or devices …

What Is Internet Security? Read More »

Security Monitoring

What Is the Difference Between Continuous Auditing and Continuous Monitoring?

Monitoring is an established component of the information security process; it goes hand-in-hand with auditing.  What’s the difference between the two? Auditing documents an organisation’s compliance activities. Monitoring protects data and provides network security by identifying threats so employees can respond accordingly. Auditing offers proof of a continued compliance effort; monitoring is the continued compliance …

What Is the Difference Between Continuous Auditing and Continuous Monitoring? Read More »

Security Monitoring

What Are the Types of Cyber Attacks?

Cybercrime increases drastically every year as attackers improve in efficiency and sophistication. Cyber attacks happen for different reasons and in many different ways. However, a common thread is that cybercriminals will exploit vulnerabilities in an organisation’s security policies, practices or technology. A cyber attack refers to an action designed to target a computer or any …

What Are the Types of Cyber Attacks? Read More »

Scroll to Top