{"id":1982,"date":"2022-09-05T13:30:35","date_gmt":"2022-09-05T11:30:35","guid":{"rendered":"https:\/\/cyberfunk-security.com\/?page_id=1982"},"modified":"2022-11-01T19:25:17","modified_gmt":"2022-11-01T17:25:17","slug":"faq","status":"publish","type":"page","link":"https:\/\/cyberfunk-security.com\/en\/faq\/","title":{"rendered":"FAQ"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1982\" class=\"elementor elementor-1982\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7ef43c3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7ef43c3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-78a3287\" data-id=\"78a3287\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4bb1c29 elementor-widget elementor-widget-heading\" data-id=\"4bb1c29\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.7.4 - 31-08-2022 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h4 class=\"elementor-heading-title elementor-size-default\">FAQ CYBERCRIME<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1af7f0 elementor-widget elementor-widget-heading\" data-id=\"b1af7f0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What you always wanted to know about cybersecurity<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2989d9a faqs elementor-widget elementor-widget-accordion\" data-id=\"2989d9a\" data-element_type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>.elementor-accordion{text-align:left}.elementor-accordion .elementor-accordion-item{border:1px solid #d4d4d4}.elementor-accordion .elementor-accordion-item+.elementor-accordion-item{border-top:none}.elementor-accordion .elementor-tab-title{margin:0;padding:15px 20px;font-weight:700;line-height:1;cursor:pointer;outline:none}.elementor-accordion .elementor-tab-title .elementor-accordion-icon{display:inline-block;width:1.5em}.elementor-accordion .elementor-tab-title .elementor-accordion-icon svg{width:1em;height:1em}.elementor-accordion .elementor-tab-title .elementor-accordion-icon.elementor-accordion-icon-right{float:right;text-align:right}.elementor-accordion .elementor-tab-title .elementor-accordion-icon.elementor-accordion-icon-left{float:left;text-align:left}.elementor-accordion .elementor-tab-title .elementor-accordion-icon .elementor-accordion-icon-closed{display:block}.elementor-accordion .elementor-tab-title .elementor-accordion-icon .elementor-accordion-icon-opened,.elementor-accordion .elementor-tab-title.elementor-active .elementor-accordion-icon-closed{display:none}.elementor-accordion .elementor-tab-title.elementor-active .elementor-accordion-icon-opened{display:block}.elementor-accordion .elementor-tab-content{display:none;padding:15px 20px;border-top:1px solid #d4d4d4}@media (max-width:480px){.elementor-accordion .elementor-tab-title{padding:12px 15px}.elementor-accordion .elementor-tab-title .elementor-accordion-icon{width:1.2em}.elementor-accordion .elementor-tab-content{padding:7px 15px}}.e-container>.elementor-widget-accordion{width:var(--container-widget-width,100%)}<\/style>\t\t<div class=\"elementor-accordion\" role=\"tablist\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4351\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"tab\" aria-controls=\"elementor-tab-content-4351\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">What is cybersecurity?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4351\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-4351\"><p style=\"font-weight: 400;\">Cybersecurity is the practice of protecting internet-connected networks, computers, mobile devices, software, applications &#8211; and the sensitive data stored on or transmitted through a network &#8211; from malicious attack.<\/p><p style=\"font-weight: 400;\">The various technologies and procedures that make up the full range of cybersecurity measures are designed to close security gaps and block attackers who try to gain access to, alter, destroy or extort sensitive customer data. It is also an important means of protection to recover quickly and efficiently from attacks aimed at blocking, disrupting or disabling an organisation&#8217;s ability to operate its own systems.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4352\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"tab\" aria-controls=\"elementor-tab-content-4352\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">Who needs cyber security?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4352\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-4352\"><p style=\"font-weight: 400;\">Some industries are more vulnerable to cyber threats due to the nature of their business (e.g. healthcare, finance and education). However, all businesses should take steps to protect their networks and their customers&#8217; confidential data.<\/p><p style=\"font-weight: 400;\">Due to technological advancements, increased connectivity and criminal activity, cyber-attacks will continue to grow exponentially &#8211; and at a high cost. According to a recent study, cybercrime will cost the world more than $6 trillion by the end of 2021 and as much as $10.5 trillion annually by 2025.<\/p><p style=\"font-weight: 400;\">With such a high price tag, it would be easy to believe that cyber criminals are primarily targeting large businesses and corporations. However, criminals have found that small businesses (SMBs) &#8211; especially those that are part of a supply chain to larger companies &#8211; are more vulnerable targets.<\/p><p style=\"font-weight: 400;\">According to a report on the global state of security, 71% of SMBs worldwide have experienced at least one cyberattack since starting their business, and 66% have been attacked in the last year alone.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4353\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"tab\" aria-controls=\"elementor-tab-content-4353\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">Why is cyber security a priority?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4353\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-4353\"><p style=\"font-weight: 400;\">Since the first known computer virus bounced between a number of affected computers in 1971, a whole series of well-documented attacks over the last 50 years have caused trillions of dollars of damage to businesses around the world. They are all strong reminders that cybersecurity is a necessity today.<\/p><p style=\"font-weight: 400;\">Now, after COVID-19, the expansion of remote working and the rise of the Internet of Things (IoT) in our ever-changing digital environment have significantly increased the potential for cyberattacks. Cybercriminals are adapting their attack methods to focus on the weakest link in the cybersecurity chain: human error.<\/p><p style=\"font-weight: 400;\">With a greater number of devices in more locations connected to more software, the need for advanced cybersecurity has never been greater for businesses of all sizes that need to protect sensitive customer data.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4354\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"tab\" aria-controls=\"elementor-tab-content-4354\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">What is a cyber-attack?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4354\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-4354\"><p style=\"font-weight: 400;\">Whether it&#8217;s stealing data, disrupting network activity or damaging devices, cyberattacks often occur in several steps:<\/p><p style=\"font-weight: 400;\">1) by scanning for vulnerabilities;<\/p><p style=\"font-weight: 400;\">2) initiating the breach; and;<\/p><p style=\"font-weight: 400;\">3) Execution of an attack.<\/p><p style=\"font-weight: 400;\">While there is no way to completely protect against all attacks, knowing what your system is up against and the current threats can help you create a more comprehensive cyber security plan.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4355\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"tab\" aria-controls=\"elementor-tab-content-4355\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">What is social engineering?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4355\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-4355\"><p style=\"font-weight: 400;\">This term covers a wide range of malicious activities that aim to exploit human error to trick unsuspecting users into giving away data, spreading malware infections or granting access to protected platforms.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4356\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"tab\" aria-controls=\"elementor-tab-content-4356\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">What is phishing?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4356\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-4356\"><p style=\"font-weight: 400;\">Phishing is a form of social engineering that is particularly effective because the message or email appears to come from a credible source. Attackers typically attempt to install malware or obtain sensitive information such as credit card details and login credentials<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4357\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"tab\" aria-controls=\"elementor-tab-content-4357\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">What is malicious software<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4357\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-4357\"><p style=\"font-weight: 400;\">&#8216;Malicious software&#8217; includes spyware, viruses\u00a0and ransomware that is installed on a system when a user clicks on a dangerous link or email. Once in the system, the virus can block access, damage systems or devices, and collect important data to extort money.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4358\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"tab\" aria-controls=\"elementor-tab-content-4358\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">What is an SQL injection?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4358\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-4358\"><p style=\"font-weight: 400;\">Cybercriminals use SQL to insert malicious codes into vulnerable servers and applications to gain access to sensitive data and execute commands or similar actions that the user has not requested.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4359\" class=\"elementor-tab-title\" data-tab=\"9\" role=\"tab\" aria-controls=\"elementor-tab-content-4359\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">What is a man-in-the-middle attack?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4359\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"9\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-4359\"><p style=\"font-weight: 400;\">Cyber criminals insert themselves between two legitimate communicating hosts to spread malware that gives the cybercriminal access to a user&#8217;s browser and the data they send. Once in control, the attacker can redirect users to a fake website that looks like the real one and steal or alter information there.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-43510\" class=\"elementor-tab-title\" data-tab=\"10\" role=\"tab\" aria-controls=\"elementor-tab-content-43510\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">What is Denial of Service (DoS)?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-43510\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"10\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-43510\"><p style=\"font-weight: 400;\">These attacks bombard servers or networks with simultaneous requests to create a high volume of traffic and prevent legitimate requests from being processed. When attacks compromise multiple devices to launch attacks on the target, this is known as Distributed Denial of Service (DDoS).<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-43511\" class=\"elementor-tab-title\" data-tab=\"11\" role=\"tab\" aria-controls=\"elementor-tab-content-43511\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">What is Advanced Persistent Threat (APT)?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-43511\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"11\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-43511\"><p style=\"font-weight: 400;\">ATPs, also known as Domain Name System Tunnelling, use continuous, elaborate techniques to gain access to a system that allows the attacker to remain there for an extended period of time.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-43512\" class=\"elementor-tab-title\" data-tab=\"12\" role=\"tab\" aria-controls=\"elementor-tab-content-43512\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">What is a Security Operations Centre (SOC)?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-43512\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"12\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-43512\"><p style=\"font-weight: 400;\">A Security Operations Centre (SOC) is a centralised function within an organisation that uses people, processes and technology to continuously monitor and improve an organisation&#8217;s security posture while preventing, detecting, analysing and responding to cybersecurity incidents.<\/p><p style=\"font-weight: 400;\">A SOC acts as a hub or central command centre that captures telemetry data from across an organisation&#8217;s IT infrastructure, including networks, devices, applications and information repositories, regardless of where those resources are located. With the rise of advanced threats, gathering intelligence from multiple sources is critical. Essentially, the SOC is the connection point for every event that is logged and monitored within the organisation. For each of these events, the SOC must decide how to manage and respond to it.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-43513\" class=\"elementor-tab-title\" data-tab=\"13\" role=\"tab\" aria-controls=\"elementor-tab-content-43513\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">What is Managed Detection and Response (MDR)?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-43513\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"13\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-43513\"><p style=\"font-weight: 400;\">Managed Detection and Response (MDR) refers to an outsourced cyber security service that protects your data and assets even when a threat escapes an organisation&#8217;s usual security controls.<\/p><p style=\"font-weight: 400;\">An MDR security platform is considered an advanced 24\/7 security control that often includes a range of basic security activities, including cloud-managed security for organisations that cannot maintain their own security operations centre. MDR services combine advanced analytics, threat intelligence and human expertise in investigating and responding to incidents at the host and network level.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-43514\" class=\"elementor-tab-title\" data-tab=\"14\" role=\"tab\" aria-controls=\"elementor-tab-content-43514\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">What is Red Teaming?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-43514\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"14\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-43514\"><p style=\"font-weight: 400;\">Red Teaming is the process of testing the security of an organisation&#8217;s systems by mimicking an attacker and breaching secure systems or data.<\/p><p style=\"font-weight: 400;\">A Red Team can be an externally appointed group of security testers or a team within your own organisation that hacks your system to prepare for a variety of cyber-attacks and security breaches before they occur. If your organisation has excellent intrusion testing tools and endpoint detection processes, Red Teams can, for example, attempt phishing or defeat physical access controls during a simulation.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-98bb045 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"98bb045\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-67f435a\" data-id=\"67f435a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7322d91 elementor-widget elementor-widget-shortcode\" data-id=\"7322d91\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"section\" data-elementor-id=\"5992\" class=\"elementor elementor-5992\">\n\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-37f45b47 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"37f45b47\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-21bc7b5\" data-id=\"21bc7b5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-76f05d34 cta-img elementor-widget elementor-widget-image\" data-id=\"76f05d34\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.7.4 - 31-08-2022 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"543\" height=\"580\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/new_woman-CTA-min.png\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/new_woman-CTA-min.png 543w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/new_woman-CTA-min-281x300.png 281w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/new_woman-CTA-min-22x24.png 22w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/new_woman-CTA-min-34x36.png 34w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/new_woman-CTA-min-56x60.png 56w\" sizes=\"auto, (max-width: 543px) 100vw, 543px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-423d51ed\" data-id=\"423d51ed\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10b91481 cta_txt elementor-widget elementor-widget-heading\" data-id=\"10b91481\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Would you like a personal consultation?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-60a32a9d\" data-id=\"60a32a9d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-47b89bdc check_btn servbtn elementor-align-right elementor-mobile_extra-align-center elementor-widget elementor-widget-button\" data-id=\"47b89bdc\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"https:\/\/cyberfunk-security.com\/en\/kontakt\/\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-right\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" width=\"34px\" height=\"34px\" viewBox=\"0 0 34 34\"><title>7FEC8EAE-F46A-449A-A694-526BBB31DC9D<\/title><g id=\"Page-1\" stroke=\"none\" stroke-width=\"1\" fill=\"none\" fill-rule=\"evenodd\"><g id=\"Cyberfunk-Security-&#x2013;-Startseite-(v1)-Deutsch\" transform=\"translate(-537.000000, -692.000000)\"><g id=\"Group-9\" transform=\"translate(135.000000, 678.416103)\"><g id=\"Group-10-Copy-2\" transform=\"translate(38.250000, 13.777935)\"><g id=\"arrow-right-copy-3\" transform=\"translate(364.500000, 0.000000)\"><ellipse id=\"Oval\" fill=\"#FFFFFF\" cx=\"17.2031615\" cy=\"16.9135166\" rx=\"12.3830454\" ry=\"12.3675048\"><\/ellipse><path d=\"M16.5198143,0 C8.83081089,0 1.97107152,5.51966692 0.362636068,13.0358986 C-0.440950239,16.7914919 0.100386581,20.7850417 1.89319647,24.1832798 C3.61865497,27.4537108 6.44741347,30.0968783 9.83182097,31.5948274 C13.3521941,33.1533166 17.3936986,33.4249066 21.0938158,32.3620901 C24.6634396,31.3371112 27.8285341,29.0874549 29.9833577,26.0675929 C34.488745,19.754177 33.886371,10.8858813 28.5858163,5.22873771 C25.4792333,1.91332197 21.0668752,0 16.5198143,0 L16.5198143,0 Z M24.4458104,17.3830199 L19.941686,21.9899595 C18.8013427,23.1566192 16.9988511,21.3891823 18.1345639,20.227988 L20.4072525,17.9034973 L9.63692288,17.9034973 C8.87206362,17.9034973 8.23390917,17.2657233 8.23390917,16.5022443 C8.23390917,15.7387654 8.87248457,15.1009914 9.63692288,15.1009914 L20.3533714,15.1009914 L18.0356416,12.7865907 C16.8839328,11.6363273 18.6695866,9.85249403 19.8212954,11.0027575 L24.4352867,15.6105379 C24.9244262,16.0986431 24.9290566,16.8890288 24.4458104,17.3830199 L24.4458104,17.3830199 Z\" id=\"Shape\" fill=\"#F12078\" fill-rule=\"nonzero\"><\/path><\/g><\/g><\/g><\/g><\/g><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Arrange an appointment<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>FAQ CYBERCRIME What you always wanted to know about cybersecurity What is cybersecurity? Cybersecurity is the practice of protecting internet-connected networks, computers, mobile devices, software, applications &#8211; and the sensitive data stored on or transmitted through a network &#8211; from malicious attack. The various technologies and procedures that make up the full range of cybersecurity [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-1982","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberfunk-security.com\/en\/wp-json\/wp\/v2\/pages\/1982","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberfunk-security.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberfunk-security.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberfunk-security.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberfunk-security.com\/en\/wp-json\/wp\/v2\/comments?post=1982"}],"version-history":[{"count":20,"href":"https:\/\/cyberfunk-security.com\/en\/wp-json\/wp\/v2\/pages\/1982\/revisions"}],"predecessor-version":[{"id":6034,"href":"https:\/\/cyberfunk-security.com\/en\/wp-json\/wp\/v2\/pages\/1982\/revisions\/6034"}],"wp:attachment":[{"href":"https:\/\/cyberfunk-security.com\/en\/wp-json\/wp\/v2\/media?parent=1982"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}