Canopius - Cyber Insurance Glossary

What is a Network Access Control List?

A network access control list (otherwise known as an ACL) is a set of rules used to manage and filter traffic in a network. It acts as a security layer, controlling the flow of inbound and outbound data by…

Read more

How Ransomware Spreads

Ransomware is a form of malicious software that infects devices, encrypts data, and demands a ransom for its release. By developing an understanding of how ransomware spreads, you’ll be able to protect your systems and data from these attacks.…

Read more

What is a DDoS Attack?

A DDoS (Distributed Denial of Service) attack is typically described as a malicious attempt to disrupt the normal traffic of a network, server, or service. It overwhelms the target with a substantial amount of internet traffic from multiple sources,…

Read more

What is Ransomware Recovery?

Ransomware recovery is the process of restoring systems and data after a ransomware attack. Ransomware is a malware type that encrypts files and will then demand a ransom for their release. This kind of attack can cripple a business,…

Read more

Endpoint Protection Platform (EPP)

What is Endpoint Protection Platform (EPP)? An Endpoint Protection Platform (EPP) is a security solution designed to protect endpoints such as laptops, desktops, servers, and mobile devices from cyber threats. It serves as a frontline defence, detecting and blocking…

Read more

What is Endpoint Detection and Response (EDR)?

Endpoint Detection and Response, or (EDR), is a cybersecurity solution that helps to detect, investigate, and respond to advanced threats targeting endpoints, such as computers and servers. Unlike traditional antivirus software, EDR provides continuous monitoring and analysis of endpoint…

Read more

What is XDR?

XDR, otherwise known as extended detection and response, is a security technology that unifies multiple security products into one integrated platform. It provides a comprehensive view of threats across an organisation’s entire infrastructure. Unlike traditional security tools that operate…

Read more

What is Endpoint Security?

Endpoint security is the protection of individual devices, or “endpoints,” such as laptops, smartphones, tablets, and servers, from cyber threats. Endpoint security solutions prevent unauthorised access and detect malicious activity before it can cause harm. It’s a crucial layer…

Read more

What is a Digital Worm?

A digital worm, also known as a computer worm, is malware designed to self-replicate and spread across networks. However, unlike viruses, these digital worms don’t require a host file or program to latch onto. Instead, they exist as self-contained…

Read more

What is an Intrusion Detection System (IDS)?

An Intrusion Detection System (IDS) is for protecting networks and data from unauthorised access and attacks. It monitors network traffic to identify malicious activities and potential threats. IDS can detect both external and internal threats, ensuring a secure environment…

Read more

What is WAN?

A Wide Area Network (WAN) is a telecommunications network that connects multiple smaller networks over long distances. WANs are used to link computers, devices, or networks from different locations. This enables them to communicate as if they were in…

Read more

What is a Keylogger?

A keylogger is a type of malicious software (malware) designed to record the keystrokes made on a computer or device. When it’s installed, it operates silently in the background, capturing everything a user types. This can include sensitive information…

Read more