fbpx

Services

9

For Business Owners

Get ahead, stay secure. Our managed IT services make it easy.

9

For IT Managers

Take your IT management to the next level with our expert support.

Useful Links

Home

Return to our home page.

About us

Find out more about Computer Care

IT Health Check

Complete our IT Health Check to see how fit your IT is.

Our E-CASH Model

9

Cyber Security

Safeguard your business with our top-of-the-line cyber security services.

9

Artificial Intelligence

Unleash the power of AI and watch your business thrive.

9

Smart Systems Management

Intelligence meets technology for a smarter future.

9

Hybrid Working

Transform hybrid work challenges into real opportunities with our solutions.

Sector-Specific Solutions

9

Accountants

Cyber security and automation solutions for accountancy firms.

9

Engineering

Maximise your IT investment to make your engineering business thrive.

9

Sports clubs

Network and infrastructure solutions for sports clubs.

Contact

9

Contact us

If you would like to get in touch, contact us here.

9

Client portal

For access to your support portal and helpdesk.

9

Remote support

For access to our remote support downloads.

Resources

Articles

Keep up to date with the latest news and technology.

Webinars

Check out our informative webinars covering a range of IT topics.

Knowledge Base

Check out our informative knowledge base articles covering a range of IT topics.

Search

Enter your search term and press enter.

Glossary

Cyber Scams Glossary

Botnet

A collection of infected computers which can be remotely controlled by a cyber criminal.

Brute force attack

The use of computer programmes to try and identify the password allowing unauthorised access to a system.

Cookies

Files held on your computer containing information about your website usage.

Data loss

The accidental loss of data, not its theft.

Data theft

The deliberate theft of data.

Data leakage

When information about a person or business is published online. This information may be used to construct spear phishing emails.

Distributed Denial of Service attack (DDoS)

An attack launched on a system by a network of computers, called a Botnet, which causes disruption to a computer or website.

Email malware distribution

Malware which is delivered via an attachment in an email.

Exploits

These are designed to take advantage of a flaw or vulnerability in a computer system, typically for malicious purposes such as installing malware.

Hacktivism

This is hacking that takes place for political or social purposes.

Keylogging

This involves the logging of keystrokes on a compromised computer or device.

Malware

This is malicious software which includes spyware, trojans, viruses and worms.

Patches

These are fixes for vulnerabilities found in software, operating systems or applications.

Phishing emails

This is the process of tricking recipients into revealing sensitive information via the sending of fraudulent emails.

Ransomware

This is a type of malware that denies you access to your files or computer until a ransom is paid.

Social engineering

This refers to the manipulation of victims in to disclosing information or completing a task they would not usually do.

Spear phishing

This is targeted phishing, often using spoofed addresses and containing information found from ‘data leakage’ to add legitimacy to its content.

Spoofing

Email spoofing is when the sender email address is falsified to assist in social engineering. Software available online is used to hide the true sender of an email.

Spyware

This is malicious software that allows cyber criminals to obtain private information without a user’s knowledge. It may record keystrokes or what websites have been visited and pass this information to the cyber criminal.

Trojan

Trojans are malicious programmes that appear to be something they are not. This could be a download that states it is a video player when in fact it is malware.

Virus

Viruses are pieces of malicious software that embed into a file and can be spread from one computer to another. They can be particularly harmful and may be used to steal data or take control of a computer – see Botnet.

Vulnerability

These are faults within programmes that can be exploited by cyber criminals to attack computers, systems and mobile devices.

Worm

A worm is a type of virus that exploits a particular vulnerability within a system and uses this to spread itself to other systems.

Zombie

A zombie is a computer that can be remotely controlled by a cyber criminal. It will have been infected within malware and may be used as part of the Botnet.

Published by the Metropolitan Police Service
© Mayor’s Office for Policing and Crime and the Crown,
March 2017

× WhatsApp us Available from 08:30 to 17:30 Available on SundayMondayTuesdayWednesdayThursdayFridaySaturday