<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Hacking Archives &#8211; IT Support Services in Huddersfield, Yorkshire</title>
	<atom:link href="https://www.probado.co.uk/category/hacking/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.probado.co.uk/category/hacking/</link>
	<description></description>
	<lastBuildDate>Mon, 28 Sep 2020 08:47:11 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://www.probado.co.uk/wp-content/uploads/2017/10/favicon-1.png</url>
	<title>Hacking Archives &#8211; IT Support Services in Huddersfield, Yorkshire</title>
	<link>https://www.probado.co.uk/category/hacking/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Top five cyber security tips for manufacturers</title>
		<link>https://www.probado.co.uk/manufacturing-cyber-tips/</link>
					<comments>https://www.probado.co.uk/manufacturing-cyber-tips/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Fri, 25 Sep 2020 09:29:18 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[Manufacturing]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2840</guid>

					<description><![CDATA[<p>The manufacturing industry has seen a myriad of exciting tech developments in the last few years, helping to aid productivity, efficiency, and the overall capabilities of a business. But all this new tech can cause cyber security concerns to arise. Manufacturing continues to be a target for</p>
<p>The post <a href="https://www.probado.co.uk/manufacturing-cyber-tips/">Top five cyber security tips for manufacturers</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-2842" src="https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1-190x114.jpg 190w" sizes="(max-width: 2492px) 100vw, 2492px" /></p>
<p>The manufacturing industry has seen a myriad of exciting tech developments in the last few years, helping to aid productivity, efficiency, and the overall capabilities of a business. But all this new tech can cause cyber security concerns to arise.</p>
<p>Manufacturing continues to be a target for cyber-attackers, and with <a href="https://www.makeuk.org/insights/reports/cyber-security-for-manufacturing">45% of manufacturers</a> feeling like they don’t have access to the right tools to protect themselves from a cyber-attack, it is now more important than ever that manufacturers put procedures in place. We’ve rounded up our top five manufacturing cyber tips to help keep your business as cyber safe as possible.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-2843" src="https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph.jpg" alt="" width="2492" height="1717" srcset="https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph-300x207.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph-1024x706.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph-768x529.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph-1536x1058.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph-2048x1411.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph-160x110.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph-87x60.jpg 87w, https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph-190x131.jpg 190w" sizes="(max-width: 2492px) 100vw, 2492px" /></p>
<p><a href="https://cerasis.com/manufacturing-and-cyber-security/">Source: Cerasis</a></p>
<h2>1. Ensure All Employees Have Cyber Security Training</h2>
<p>It is vital that all members within your team receive regular cyber security training. When dealing with high tech equipment on a daily basis, it is crucial that employees are comfortable using certain tech and can identify and report any cyber security concerns quickly and efficiently. Being familiar with the technology and operating systems that are being used will ensure anything out of the ordinary can be flagged and dealt with in the correct way.</p>
<h2>2. Update Your Protection Software</h2>
<p>While it may seem obvious to install antivirus programmes, it is vital that all internet connected devices within a network are protected. Make sure antivirus software and intrusion detection software are <a href="https://www.probado.co.uk/security-and-software-updates/">regularly updated</a> and deployed across your network. Automate this process where possible to make sure updates are done as soon as possible. It is important that any updates are done quickly as these will plug any holes or fix any errors that have been found.</p>
<h2>3. Don’t Forget Your IIOT</h2>
<p>Industrial Internet of Things (IIOT) technologies are becoming commonplace in most UK manufacturing businesses. Whether you’ve got large pieces of machinery, connected sensors, or personal protection wearable devices, they all must be protected. These devices can often be forgotten when considering cyber security. We suggest adopting the mindset of if it’s got an internet connection, it can be hacked and therefore needs protecting!</p>
<h2>4. Back Up Key Data and Programmes</h2>
<p>In the event that a breach or error should occur, it is important that all files, data, and operating programmes are backed up and able to be recovered. In the manufacturing industry, data loss can bring your business to a halt, causing expensive downtime. Making sure everything is backed up and accessible should the worst happen could save a lot of time and money. We suggest you consider opting for an <a href="https://www.probado.co.uk/what-are-data-centres/">external data centre</a>, these can be managed by an expert company and can keep your data safe should your network be accessed.</p>
<h2>5. Think Like a Hackers</h2>
<p>When it comes to manufacturing cyber tips, we recommend putting yourself in the shoes of a hacker. This may sound strange, but the best way to protect yourself from a hacker is to understand their motivations. Look at your business and identify any key areas, devices, or assets that would be of interest to a hacker. Cybercriminals are generally inspired by financial gains, so any data containing personal information, customer records, or actual cash is what they’ll be after. We recommend setting up <a href="https://www.probado.co.uk/password-security-for-smes/">multi-factor authentication</a> as well as restricting access to just those employees who require it. These actions will help limit the opportunities for accessing valuable data and add an extra layer of protection.</p>
<p>Here at Probado, we regularly work with manufacturers to ensure their systems are safe and can operate at the highest level <a href="https://www.probado.co.uk/cyber-security-across-multiple-sites/">across all sites</a>. For more manufacturing cyber tips, check out our blog on <a href="https://www.probado.co.uk/manufacturing-cyber-security-risks/">how to avoid manufacturing security risks</a>.</p>
<p>The post <a href="https://www.probado.co.uk/manufacturing-cyber-tips/">Top five cyber security tips for manufacturers</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/manufacturing-cyber-tips/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>A guide to ethical hacking</title>
		<link>https://www.probado.co.uk/guide-to-ethical-hacking/</link>
					<comments>https://www.probado.co.uk/guide-to-ethical-hacking/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Mon, 13 Jul 2020 13:57:46 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[Ethical hacking]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2771</guid>

					<description><![CDATA[<p>The term ‘hacking’ is often associated with cybercriminals and those who will take advantage of your every click. However, there is a type of hacker that can be your friend and will help protect you and your business. This practice is called ethical hacking. Big brands, including</p>
<p>The post <a href="https://www.probado.co.uk/guide-to-ethical-hacking/">A guide to ethical hacking</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="aligncenter size-full wp-image-2769" src="https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500-190x114.jpg 190w" sizes="(max-width: 2492px) 100vw, 2492px" /><br />
The term ‘hacking’ is often associated with cybercriminals and those who will take advantage of your every click. However, there is a type of hacker that can be your friend and will help protect you and your business. This practice is called ethical hacking. Big brands, including Facebook, employ ethical hackers to help keep them safe. But just what is ethical hacking, and can your business benefit?</p>
<h2>Spot the difference</h2>
<p>While they sound similar and are both practices using the same techniques, ethical and unethical hacking should not be confused. An ethical hacker is legitimately hacking your system to find any issues or areas of weakness. Unethical hackers are hacking your system to cause trouble, steal data and/or information or to try and extort funds from your business. The use of ethical hacking can actually prevent unethical hackers from gaining access to your network and devices.</p>
<p>A common misconception with ethical hacking is the legality behind it, many individuals believe that hacking of all types is an illegal practice. However, that is not the case. Ethical hacking is perfectly legal. <a href="https://www.itgovernance.co.uk/ethical-hacking">IT Governance</a> explains that ethical hackers ‘have the same knowledge and tools as a criminal hacker, but their work is conducted in a lawful manner’.</p>
<h2>Why do it?</h2>
<p>It may sound counterproductive, employing people to hack your business. However, this can be a crucial defence mechanism in protecting your business. Ethical hackers will notify you of any weak spots, unprotected areas, or easy ways that malicious hackers can take advantage of and gain access to your network. This will allow you to patch these holes and add technical armour to any areas of weakness before a product goes to market or a system into use. Ethical hacking does what it says on the tin, it is the practice of hacking systems and devices in an ethical manner. It can also be referred to as <a href="https://www.probado.co.uk/cyber-security-jargon/">penetration testing</a>, trying to penetrate a system to test its defences.</p>
<p>Ethical hacking has been around since the early days of the internet. According to <a href="https://medium.com/@TheFarmanShekh/examples-of-ethical-hacking-how-hacking-can-improve-our-lives-fbf6ec1c9b1d#:~:text=The%20practice%20of%20breaking%20into,to%20discover%20its%20weak%20points">Medium.com</a>, the United States Air Force used ethical hacking procedures to evaluate the security of an operating system which unearthed some vulnerable software and hardware. This then allowed them to fix the problem before the system was put into use.</p>
<h2>Covering all bases</h2>
<p>When engaging an ethical hacker, it is important that you have a clear brief. Be sure to specify which devices you wish to be tested or if it is the full network. We recommend testing the entire network, your individual devices may be secure but when operating with a company-wide network it is vital that all devices, systems, and applications are safe. Your business is only as strong as your weakest device or system.</p>
<p>If that still sounds too good to be true, check out Packt’s examples of successful ethical hacking missions <a href="https://hub.packtpub.com/10-times-ethical-hackers-spotted-a-software-vulnerability-and-averted-a-crisis/">here</a>.</p>
<p>If you have any questions, please <a href="https://www.probado.co.uk/contact-probado/">get in touch</a> with a member of our team.</p>
<p>The post <a href="https://www.probado.co.uk/guide-to-ethical-hacking/">A guide to ethical hacking</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/guide-to-ethical-hacking/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Staying safe on social media</title>
		<link>https://www.probado.co.uk/staying-safe-on-social-media/</link>
					<comments>https://www.probado.co.uk/staying-safe-on-social-media/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Thu, 02 Jul 2020 16:47:54 +0000</pubDate>
				<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Passwords]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[Staying safe on social media]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2745</guid>

					<description><![CDATA[<p>Social media can be a fantastic place to network, promote your business and products and to share information. However, cybercriminals often look to social media to exploit weak passwords or gain information. Here is our guide to staying safe on social media. Strong Passwords A strong password</p>
<p>The post <a href="https://www.probado.co.uk/staying-safe-on-social-media/">Staying safe on social media</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-2743" src="https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges-190x114.jpg 190w" sizes="auto, (max-width: 2492px) 100vw, 2492px" /><br />
Social media can be a fantastic place to network, promote your business and products and to share information. However, cybercriminals often look to social media to exploit weak passwords or gain information. Here is our guide to staying safe on social media.</p>
<h2>Strong Passwords</h2>
<p>A strong password is essential for staying safe on social media. Weak passwords can often be the window cybercriminals use to gain access to social media accounts. This means they can access any information posted or stored on the site. Make passwords complex and don’t include personal or widely known information such as your name or office address. Enable multi-factor authentication wherever possible to ensure maximum security. This means having two or more layers of protection, for example a password and an additional PIN number sent to your mobile phone.</p>
<p>Use different passwords for each social media platform. This will ensure that if one account is compromised it will limit the potential risks across other accounts. For more tips on how to create and maintain strong passwords for your business, <a href="https://www.probado.co.uk/password-security-for-smes/">click here</a>.</p>
<h2>Don&#8217;t Share Personal Information</h2>
<p>You wouldn’t stick a poster with all of your bank details on in a busy shop window, so why put them on social media? Lots of businesses are now using social media to help advertise their products and services, which can be a great tool to help get your brand noticed. While it may be easier to tick a box and save your bank details for the next time you run a campaign, we recommend that you do not do this. If for some reason your account is compromised, all of this information could be taken and used elsewhere. It’s better to be safe than sorry!</p>
<p>Be wary of any details you choose to link to your social media accounts. If it isn’t direct contact or banking details, it might be personal details that could be used to guess a password or work out your security questions.</p>
<h2>Privacy Settings</h2>
<p>Privacy settings are there to keep you safe. Most social media sites allow you to decide what information is public or private on your account, including contact details and locations.</p>
<p>We recommend checking your settings regularly to ensure your privacy is respected even when the platform changes its rules. All platforms should inform you if anything changes with their privacy policies, but it is best to keep an eye on it yourself and manage what information is publicly available.</p>
<h2>Keep Antivirus Up-to-date</h2>
<p>Treat social media like you would any other website or app that can be subject to attack by cybercriminals. Make sure your antivirus programmes are up to date on all devices across your network. You may not think antivirus software does very much, but it is constantly running in the background, working hard to keep you safe.</p>
<p>Social media sites can be informative and helpful, but some individuals will use these channels to share fake news and bad links. Using an antivirus software will help protect you from straying into dark corners of the worldwide web.</p>
<p>Social media can be a great platform for businesses; however, there are risks and individuals that exist who will try to exploit these channels. The best way to ensure you and your employees are staying safe on social media is to regularly update training so everyone knows how to spot suspicious activity and is comfortable reporting it. Make sure you have a social media policy in place to make employees aware of best practices while using these channels.</p>
<p>For more information on how to keep your business safe, get in touch with a member of our team <a href="https://www.probado.co.uk/contact-probado/">here</a>.</p>
<p>The post <a href="https://www.probado.co.uk/staying-safe-on-social-media/">Staying safe on social media</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/staying-safe-on-social-media/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyber security jargon you need to know</title>
		<link>https://www.probado.co.uk/cyber-security-jargon/</link>
					<comments>https://www.probado.co.uk/cyber-security-jargon/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Thu, 28 May 2020 12:39:57 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[Cyber security jargon]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2735</guid>

					<description><![CDATA[<p>Cyber security jargon can be confusing. However, securing your systems needn’t be a big, confusing job and our team is here to support you every step of the way. We’ve compiled some of the most common cyber security jargon to help you get to grips with how</p>
<p>The post <a href="https://www.probado.co.uk/cyber-security-jargon/">Cyber security jargon you need to know</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-2729" src="https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1-190x114.jpg 190w" sizes="auto, (max-width: 2492px) 100vw, 2492px" /><br />
Cyber security jargon can be confusing. However, securing your systems needn’t be a big, confusing job and our team is here to support you every step of the way. We’ve compiled some of the most common cyber security jargon to help you get to grips with how to keep your systems safe.</p>
<h2>1. Hacker</h2>
<p>The word hacker can instantly conjure up images of masked criminals using complex codes to steal data from a computer. While the term ‘hacker’ is correct for this individual it is also a wider term used to describe those who possess the skills to gain unauthorised access to computer systems. These are not necessarily bad guys. Many software and tech companies actually employ hackers to test software and identify areas of weakness so they can be fixed.</p>
<h2>2. Phishing</h2>
<p>Not to be confused with the pastime using bait and rods, phishing is a term for an online scam. Merriam-Webster defines phishing as a ‘scam by which an internet user is duped into revealing personal or confidential information which the scammer can use illicitly’. A common example of this is a fraudulent email pretending to be a bank aiming to obtain bank details to then hack, blackmail or steal money.</p>
<h2>3. Malware</h2>
<p>The clue to malware is in the name, ‘mal’ comes from malicious and ‘ware’ from software. Malware is just that, malicious software. Viruses, spyware and Trojan horses are all various types of malware and should be protected against as much as possible. The easiest way to protect against malware is to simply be careful online. Be wary of unusual emails, strange pop-ups and alerts, and odd-looking downloads.</p>
<h2>4. Patching</h2>
<p>Patching can mean a number of different things, including fixing the hole in that old pair of jeans! When it comes to cyber security, patching is a very similar process. The National Cyber Security Centre defines patching as ‘applying updates to devices or software to improve security and/or enhance functionality’’.</p>
<h2>5. Encryption</h2>
<p>The term encryption gets thrown around a lot when it comes to cyber security, but do you know what it actually means? According to Tom’s Guide, encryption refers to ‘a process used to make sensitive data more secure’. This means converting the data into a code that wouldn’t make sense to most. Another term that you should be aware of is cryptography. This is the term for the science behind encrypting and decrypting data.</p>
<h2>6. VPN</h2>
<p>A VPN, or Virtual Private Network, is a way to safely surf the web on a public internet connection. A VPN hides your IP (internet protocol) address so that your online activities are hidden from view and safe on a potentially harmful network. Online security firm Norton describes the process as a ‘data tunnel between your local network and an exit node in another location’.</p>
<h2>7. Firewall</h2>
<p>Forcepoint defines a firewall as ‘a network security device that monitors incoming and outgoing traffic’. A firewall has the ability to block or deny access to any traffic that is deemed harmful or seems a little bit ‘phishy’. Think of it as a security guard for your device, monitoring anything attempting to gain access.</p>
<h2>8. Ransomware</h2>
<p>Ransomware is a type of malware designed to lock users out of devices or accounts and effectively hold them for ransom. Hackers will demand money or something else of value to allow the user to regain access again to their device or account. Ransomware can enter a device through a comprised website or a dodgy download. This is why firewalls and antivirus software are so important as they can attempt to stop these harmful files before they gain access.</p>
<h2>9. Clickjacking</h2>
<p>Clickjacking is a particularly sneaky way that hackers (the bad kind) will get a user to download malware or inadvertently click through to a harmful website. This is done by disguising an element on a web page as something else or creating an invisible element that users won’t even realise is there. A form of clickjacking is ‘likejacking’, which according to Imperva is a ‘technique in which the Facebook like button is manipulated, causing users to like a page or post they did not intent to’.</p>
<h2>10. Pen-testing</h2>
<p>Short for ‘penetration testing’, pen-testing can also be referred to as ethical hacking. This is a process where trained hackers will attempt to penetrate a system to look for weaknesses that cyber criminals could potentially manipulate. Described by ITGovernance.co.uk as ‘a controlled form of hacking’ pen-testing is a great way to test systems, updates, firewalls and overall security. Many companies will employ ethical hackers that will regularly attempt to access systems to ensure that they are on top of their cyber security and can patch any holes as quickly as possible!</p>
<p>When it comes to cyber security jargon there can be a lot of confusion, so it’s no surprise that users get confused and put off and end up leaving themselves at risk. However, the majority of problems can usually be fixed by ensuring staff training is up to date. With all the jargon and ever-evolving systems and technology, educating staff on key skills and processes is often missed. A business could have the best tools and the most expensive systems but if staff don’t know how to properly use these systems and aren’t aware of potential treats and how to report them, the door could be left wide open.</p>
<p>Here at Probado we aim to avoid the techno-babble and ensure you know exactly what is going on with your IT and how to operate it. If you’re unsure about some cyber security jargon or would like to know more about our training packages, get in touch with a member of our team here.</p>
<p>The post <a href="https://www.probado.co.uk/cyber-security-jargon/">Cyber security jargon you need to know</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/cyber-security-jargon/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
