It is control over personal information online, covering data collection, usage and sharing by companies and government, location and account details from unauthorized access with risks including data breaches and spyware.
The process of putting data into a secret code that can only be accessed with the unique key.
Creates a secure encrypted tunnel for users Internet traffic and hides IP address which protects data from hackers.
This is a legal document or statement which explains how an organization collects, uses shares and protects their user’s information.
It is any form of software designed to harm or gain unauthorized access to a computer, network or device. Examples of malware include virus, trojan, worm etc.
It is a cyber-attack used to manipulate individuals into giving out their confidential or personal information to attackers.
A cyber-attack using deception such as emails, text, calls to trick victims into revealing data (password, bank information or installing malware).
They are cyber-attacks that lock up an organization information system and demand a ransom payment for decryption key or in order to release the stolen data.