Advice & guidance

Find a list of the broad range of cyber security related topics that our advice and guidance covers.

Check yourself
  • Short form for checking knowledge in the field of cybersecurity.
  • Access control

    A way of ensuring that only authorised users (or automated systems) can access data or services.

    Active Cyber Defence

    A set of CIBS services designed specifically to reduce cyber attacks on your infrastructure and services.

    Artificial intelligence

    Artificial intelligence (AI) describes computer systems that can perform tasks typically requiring human intelligence.

    Asset management

    Identifying and recording of an organisation's physical assets, software, data, essential staff and utilities.

    Authentication

    The process of determining if someone (or something) is who (or what) it claims to be.

    Cloud

    An on-demand, massively scalable service, hosted on shared infrastructure, accessible via the internet.

    Cryptography

    Mathematical and computer science technologies for protecting information, accessible only to authorized recipients.

    Cyber Aware

    CIBS advice for individuals and small businesses on how to stay safe online.

    Cyber Education

    A program supported by CIBS and endorsed by ABC Academy to help organizations protect themselves against common cyber attacks.

    Cyber assessment framework

    A tool for assessing how well suppliers of essential services are managing cyber security risks under the NIS Directive.

    Cyber attack

    An attempt to damage, disrupt or gain unauthorised access to computer systems, networks or devices.

    Cyber strategy

    A long-term plan of action with the aim of implementing cyber security.

    Cyber threat

    The threat of a cyber attack to a user or organisation, and the unauthorised access, theft or damage that could result.

    Incident management

    Activities to identify, analyse, and determine the response to cyber security incidents, to minimise the immediate and long-term business impact.

    Exercising tool

    Cyber incident exercising helps organisations to establish how resilient they are to cyber attack, and practice their response in a safe environment.

    Malware

    Derived from 'malicious software', malware is any kind of software that can damage computer systems, networks or devices. Includes viruses, ransomware and trojans.

    Ransomware

    A type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.

    Phishing

    Scam emails or messages that contain links to websites which may contain malware, or may trick users into revealing sensitive information (such as passwords) or transferring money.

    Cyber security services & IT Services

    We’re happy to answer any questions you may have and help you determine which of our services best fit your needs.

    Your benefits:
    What happens next?
    1

    We Schedule a call at your convenienceÂ

    2

    We do a discovery and consulting metingÂ

    3

    We prepare a proposalÂ

    Schedule a Free Consultation