Publish: 2 July 2018

Hub One presents its "cyber-glossary"

<![CDATA[

– A guide to better understanding the vocabulary of cybersecurity –

Hub One, provider of information and communication technology services in professional environments, unveils its cybersecurity glossary. Through this document, Hub One wishes to make it easier for you to understand the terms linked to this environment.

 
The deployment of new technologies in companies is a key success factor. IoT (Internet of Things), BYOD (Bring Your Own Device) and the Cloud make life easier for workers and provide incredible opportunities for growth.
Faced with these new usages, information systems are increasingly exposed to cyber risks. Trojan horses, DDoS, ransomware, malicious acts or negligence on the part of employees: cyber risks are many and varied, with a specific and technical vocabulary that can sometimes not be easy for everyone to understand.
In this context, and in its desire to support businesses, Hub One has come up with the first reference glossary in the field of cybersecurity. Simple and clear, this living, practical guide provides a comprehensive overview of the various facets of cyber risk, with definitions of many of the terms in use in this business universe.
 
 ]]>

To receive Hub One documentation targeted to your needs

This site stores cookies and other trackers on your equipment. These cookies are used by Hub One to collect information on how you interact with the Site and to establish statistics and volumes of visits and use in order to improve the User's journey. You can choose not to allow certain types of cookies. Click on the different cookie category headings below to learn more and change your cookie settings.

You can revoke your authorization to use cookies at any time (Cookie preferences). A cookie will always be used to remember your choices. Refusing the use of certain cookies may have an impact on your use of the Site.
Find out more: Cookies policy
Cookie preferences
Refuse all cookies
Accept all cookies