Qlic Archive

Term: Cyber Security

Qlic's Archives

Social Engineering

The tactic of manipulating, influencing or deceiving a victim in order to gain control over a computer system to steal personal or financial information.

Smishing

A type of Social Engineering attack that uses fake mobile text messages to trick people into downloading malware, sharing sensitive information or sending money to

Phishing

A type of Social Engineering attack, often used to steal user data, including login credentials and credit card numbers. Often occurring when an attacker dupes

Security Awareness Training

Training to enhance the security consciousness of an organisation. Covering Topics such as Cybersecurity, Information security and best practices for safeguarding sensitive data. The goal

GDPR

GDPR is a legal framework with guidelines for the collection and processing of personal information in the EU. It affects all organisations that hold personal

Cyber Essentials

Cyber Essentials is a Government backed scheme that will help you to protect your organisation against a whole range of the most common cyber attacks.

Firewall

Firewalls provide the ultimate network security with everything you need in a single modular appliance. It simplifies your IT security without the complexity of multiple-point

Device Encryption

Each year, millions of laptop computers are misplaced, stolen, or lost; many of them containing important and sensitive data. Full device encryption is the essential

Ransomware Protection

Ransomware is the number one cyber attack affecting organisations today. It encrypts your files and holds them hostage until the ransom is paid, causing massive

Email Filtering

With email filtering, you can protect your cloud mailboxes against new, sophisticated attacks in real time. By protecting against unsafe attachments and expanding protection against

Anti-Virus & Malware Protection

Anti-Virus & Malware Protection blocks malware and infections by identifying and preventing the handful of techniques and behaviours used in almost every exploit.

Managed Detection & Response

Managed Detection & Response provides 24/7 threat hunting, detection, and response capabilities delivered by an expert team as a fully-managed service

Get in Touch

Please fill in the form below and we will get back to you shortly.

Get a Quote

Please fill in the form below and we will get back to you shortly.

Book Your Free IT Consultation

We offer free IT advice and consultancy to all organisations. Let us know what you’re interested in below so we can book your free IT consultation.