Glossary

TABLE OF CONTENTS

External vs. Internal Threats
Risks coming from outside your network (hackers, phishing) vs. inside (misuse, insider threats, poor settings).


Penetration Testing (Pen Testing)
A simulated cyber attack carried out by security experts to identify and safely exploit vulnerabilities in your systems -  helping you find and fix weaknesses before real attackers do.

Remediation
The process of identifying, fixing, and closing cybersecurity gaps or vulnerabilities before attackers can exploit them

CREST-Accredited
CREST is a recognised global certification body for cybersecurity. A CREST-accredited provider meets rigorous standards for technical expertise, process, and integrity -  giving you assurance your testing is trusted and professional.

Continuous Threat Monitoring
Real-time, always-on monitoring of your systems to detect and alert you to suspicious activity or vulnerabilities - helping you stay protected between tests and spot risks early.

Threat Intelligence
Insight into emerging cyber threats, trends, and attacker behaviours - helping your business prepare for risks before they become real-world problems.

Compliance
Meeting cybersecurity standards (like Cyber Essentials) required by customers, partners, or regulations.

Cyber Essentials
A UK Government-backed certification that demonstrates your business has basic cybersecurity controls in place - often required by suppliers, customers, and public sector contracts.

Cyber Essentials Plus (CE Plus)
A more rigorous version of Cyber Essentials. It includes a hands-on technical audit by a certified assessor to validate your systems are secure in practice - not just on paper.
Vulnerabilities
Weak spots in software or systems that attackers can exploit - like unpatched software, misconfigured settings, or insecure code.

Patch management
The process of updating software to fix security flaws. Poor patch management is one of the most common causes of cyber breaches.

Threat score
A measurement of how at-risk your systems are, based on known vulnerabilities, active threats, and severity. Helps teams prioritise what to fix first.

Real-time alerts
Instant notifications triggered by suspicious activity, vulnerabilities, or attacks - enabling quick action before damage is done.

Phishing
A type of cyber attack where attackers trick users into clicking fake links or giving away personal or business information (often through emails).

Malware
Malicious software designed to damage, disrupt, or gain unauthorised access to a system - includes viruses, worms, and spyware.