Cyber Vigilance

Frequently Asked Questions

Find answers to some FAQs around cybersecurity and our services.

Common Questions Asked

These FAQs will give you insights into our company operations and expert advice on IT security.
Whether you're curious about our services or need guidance on protecting your digital assets, we’ve something for you.
As IT consultants, we are responsible for coaching our clients and assisting them in developing an effective cybersecurity plan tailored to their specific needs.

Information security is the activity of safeguarding data and information systems from unauthorized access, modification, or destruction. It refers to the security of all IT resources, including University information and the IT equipment that access, process, store, or transmit it.

An IT device is any device that accesses, processes, stores, or transmits University information while utilizing the University’s IT infrastructure, which includes the University network. IT gadgets include desktop and laptop computers, cellphones, tablets, network devices, and printers.

IT resources are the entire set of IT devices and data held by a firm or institution that are used to access, process, store, and transmit information. IT resources encompass both company/institutional information and IT devices.

Confidentiality refers to the privacy of information, including permissions to access, distribute, and utilize it. If information with low confidentiality concerns gets exposed to anyone other than the intended audience, it may be termed “public” or otherwise non-threatening. Information with significant confidentiality issues is deemed secret and must be kept private in order to avoid identity theft, account and system compromise, legal or reputational harm, and other serious consequences.

Looking for cyber security training and consultancy?

Lorem ipsum dolor Consect Elementum Felis Fringilla