CIS Logo
tagline: Confidence in the Connected World


Backups are a copy of a system or network’s data for file restoration or archival purposes and are essential for data protection and recovery.


Multi-factor authentication is a digital authentication method that requires two or more distinct authentication factors for successful authentication.


Malware is a malicious software that enters a system via email or suspicious websites.It is designed to perform malicious actions on a device.


Malicious email campaigns attempt to trick a recipient into revealing confidential information, downloading malware, or sending money.


A web attack targets vulnerabilities in websites to gain unauthorized access, obtain confidential information, introduce malicious content, and more.


What it is Spoofing occurs when cyber threat actors seek to disguise their true identity by falsifying the sender of the message in order to trick



What it is Bots are automated applications or scripts designed to perform repetitive tasks without requiring human input Overall, bot activity



Within the information security community, the term hacker does not always have a negative connotation and not all hacking is considered inherently bad.


What is it Social engineering is the use of deception to manipulate individuals into providing a particular response, generally for a fraudulent or



What is it An email bomb is an attack against an email inbox or server designed to overwhelm an inbox or inhibit the server’s normal function,



What is it Phishing occurs when malicious actors masquerade as legitimate entities during electronic communication in an attempt to compromise



What it is Passwords are a critical yet basic authentication mechanism in information security that consists of a combination of alphabetic,



Patching is the process of applying available updates to an operating system, website, software, hardware, or plugin tp address identified vulnerabilities.


What it is Hyper Text Transfer Protocol Secure (HTTPS) is an Internet communication protocol used to encrypt and securely transmit information



What it is Typosquatting attempts to take advantage of typographical errors (ie “typos”) introduced by users when URLs are typed directly into



1 2 3