You deserve to have your questions answered in plain English. Our technicians will clearly explain what is happening so you understand. We do our best, to not sound like THIS!

AJAX progress indicator
  • b

  • A brute force attack is a type of malicious attack that can be used to gain access to a system or network. It involves an attacker attempting to guess a password, PIN or other authentication credentials by trying every possible combination until the correct one is found. This type of attack(...) Read More
  • d

  • A data breach occurs when sensitive or confidential information is accessed, stolen, or exposed by an unauthorized entity. This can happen due to a variety of reasons, such as hacking, phishing, or human error. The consequences of a data breach can be severe and far-reaching, including(...) Read More
  • A dictionary attack is a systematic method of guessing a password by trying many common words and their simple variations. Attackers use extensive lists of the most commonly used passwords, popular pet names, fictional characters, or literally just words from a dictionary – hence the name of(...) Read More
  • e

  • Encryption is the process of encoding information so that it is only readable by those who have the key. It is a powerful tool used to protect sensitive data, such as financial information and personal data, from being accessed by unauthorized individuals. It is also used to ensure the(...) Read More
  • o

  • A one-time password, also known as an OTP, is a type of authentication that requires a user to enter a unique string of numbers or characters each time they attempt to log in. This type of authentication is designed to provide an extra layer of security to user accounts by preventing(...) Read More
  • p

  • TLDR The most important factor in password strength is length. Passphrases are a string of words, like a favorite song lyric or quote. These can be both long and easy to remember! Aim to create a passphrase that is 16 characters or more. Use a mix of alphabetical and numeric, a mixture of(...) Read More
  • A password manager is software that helps users manage and store their passwords securely. With the increasing number of online accounts, it has become challenging to remember unique passwords for each account. Password managers solve this problem by generating and storing strong, unique(...) Read More
  • Phishing is an increasingly common form of cyberattack used to gain access to sensitive information, such as passwords and financial information. It involves attackers sending out malicious emails that appear to come from a legitimate source, such as a bank. The emails will often include a(...) Read More
  • The term "pwned" is a slang term used to describe when someone has been hacked, defeated, or taken advantage of in some way. It is derived from the word "owned" and is commonly used in online gaming and on the Internet as a whole. It is a way of acknowledging that someone has been outwitted or(...) Read More
  • r

  • Ransomware is a type of malicious software that can take control of a user's computer and encrypt files, making them inaccessible until a ransom is paid. Ransomware is typically spread through malicious email attachments, malicious websites, and unpatched software vulnerabilities. While(...) Read More
  • s

  • Social engineering is the practice of manipulating people into performing actions or divulging confidential information. It is a type of fraud that relies on human interaction and involves exploiting the natural tendency of people to trust each other. Social engineering techniques are used to(...) Read More
  • Strong/Secure passwords are important for our online security. They should be complex and long, with at least 8 characters and a mix of upper and lower case letters, numbers, and symbols. Avoid using personal information such as birthdates, names, or pet names. It is also important to use(...) Read More
  • t

  • Two-Factor Authentication (2FA) is an important tool for protecting sensitive data. It is a security measure that requires two different authentication factors (methods) in order to access an account. The first factor is typically something the user knows, such as a password, and the second(...) Read More