FAQ's

Multi-factor authentication is typically the use of a password and a 2nd factor e.g. mobile phone fingerprint in order to gain access to an application. This significantly increases the security of your data held in those applications as the user can no longer gain access with password alone.

Data management is the activity of creating secure storage locations for all electronic documents retained by the business. The objective of data management is to ensure only the appropriate individuals can gain access to the documents relevant to themselves.

Sensitive data is defined as any data that relates to an identifiable individual and their personal situations. Data that identifies; sexual orientation, health, ethnicity, politics, beliefs and religion are all deemed sensitive data.

Cybersecurity refers to the protection of hardware, software, and data from attackers. The primary purpose of cyber security is to protect against cyber threats such as ransomware, spoofing, malware, viruses and phishing.

Greenlight Cyber has developed a comprehensive suite of solutions covering the top 20 elements of cybersecurity. For more information click here to see the list of elements.

Secure Sockets Layer (SSL) is a technology creating encrypted connections between a web server and a web browser. It is used to protect the information in online transactions and digital payments to maintain data privacy.

Daily backup is the norm but for larger organisations additional hourly shadow copy backup is also recommended. Backup versioning is the second dimension as a virus could penetrate without notice and remain dormant for a period, hence 7 day, 4 week and 6 monthly backup is common practice.

Best practice is to hold a local backup and a separate cloud backup of your data. The local backup will be used for quick recovery requirements and the cloud backup will provide the disaster recovery in case of onsite issues.

Data leakage is an unauthorised transfer of data to the outside world. Data leakage occurs via email, intrusion, internal sabotage, accidental access etc. Tracing, prevention and recovery tools exist to help protect your business.

Virtual Private Network (VPN) is a network connection method for creating an encrypted and safe connection. This method protects data from interference.

It is a trial-and-error method to find out the right password or PIN. In many cases brute force attacks are automated where the software automatically works to login with credentials. There are ways to prevent brute force attacks, the adoption of multi-factor authentication (MFA) is the most effective protection.