Technology and Protection
This module aims to provide an in-depth understanding of the means of protection against cyberattacks for SMEs. It explores practical strategies and solutions that can be put in place to guard against classic attacks (e.g. passwords, hardening, network segmentation and log monitoring, to name but a few).
Resources
This module provides details of additional resources, including tools, useful documents and other content, to explore the issues in greater depth and better guard against and respond to cyberincidents.
Technology
Definition: 3-2-1 backup rule The 3-2-1 backup rule means saving at least 3 copies of your data on 2 different types of media, with at least 1 of those copies stored away from your primary location. This provides maximum protection against data loss in the event of damage to any backup media, including software errors, […]