1.the action of reducing the severity, seriousness, or painfulness of something.
IS Know How would like to be clear, that everything that we do - is 'Mitigation' and not 'Protection', or offered as 'Secure'. Due to the very nature of Data & Cyber Security, NOTHING is 100% 'Protected', or 'Secured' but can be vastly 'Mitigated' against the many routes that Data and Cyber Breaches take.
When legitimate users are denied access to computer services (or resources), usually by overloading the service with requests.
The state of being protected against the criminal or unauthorised use of electronic data, or the measures taken to achieve this.
Malicious software that makes Data or Systems unusable unless the victim makes a payment and there is no Guarantee that the attacker, will release the encrypted files at the end of the process.
Is either Hardware or Software based, which uses a defined set of rules to constrain network traffic and prevent unauthorised access to or from a network.
Are Untargeted, Mass Emails sent to many people asking for Sensitive Information (such as bank details) or encouraging them to visit a fake / malicious website.
Where shared compute and storage resources are accessed as-a-service (usually on-line), instead of hosted locally on physical services. Resources can include infrastructure, platform or software services.