A is for…

01 Jan 2018

A is for…

Cyber Security doesn’t need to be complicated, so to ease us into the new year, how about we go back to basics with the language of cyber. We cant all be tech savvy… or can we?

We will be sharing with you the down to earth A-Z of Cyber Security, so if you want to know your Antivirus from your Antispam, this series of articles are just for you!

Access Control

Access Control is all about making sure that users only have access to the systems or files that they legitimately need access to. For example, someone in accounts is unlikely to need access to the HR system, so you wouldn’t give them that access. This is also known as the Principle of Least Privilege, or in spy films it would be called “need-to-know”. Access control also means revoking access eg if a person leaves your company or where their job role means they no longer need access.

The intention is to reduce the risk of data loss, manipulation or deletion by unauthorised personnel, so it’s a risk mitigation strategy and is very much a core part of Information Security.

Antimalware / Antivirus

These terms are often used interchangeably, and refer to the function of a particular software package. It’s intended to be able to protect systems against viruses (antivirus) or malicious code (antimalware). In practice, many viruses are used to carry a payload which may include malicious code (malicious software, which is often referred to as malware).


Often talked about in the same breath as antimalware or antivirus, this software is specifically written to reduce the amount of spam email messages you receive. It is estimated that almost 60% of email globally today (at the end of 2017) is spam. When you think that there are around 205 billion emails sent a day, 74 trillion emails a year, 60% is a staggering number, so it makes sense to use software to stop you from receiving spam if possible.


An application (often referred to, particularly on mobile devices, as an app) is a software programme written to perform a specific function, or set of functions. For example, Word is a well known Word Processing application, and Facebook is a Social Media application.


This is the term used to describe the process by which you verify yourself as a user to the computer or mobile device. Typically this is done by having a username with a password, but it could easily just be the pin number you use to unlock your phone. Authentication also makes use of things like biometrics and / or other devices as part of a process called Two Factor Authentication or 2FA. 


In information security, we often refer to the three pillars that security is built on, known as CIA. These are Confidentiality, Integrity and Availabilty, and are the three main factors we look at when protecting data.

Availability is all about making sure that data is available whenever it is needed, and is therefore a key part of your business continuity and disaster recovery planning.


Protection Group International believes that cyber security doesn’t need to be overly complicated, incomprehensible or vastly expensive. We specialise in delivering strategic vulnerability assessment services and offer a range of senior cyber awareness education to enable you to tackle cyber threats in-house. For more information click here.

Our partner company, Protection Vessels International, is focussed on the efficient delivery of high quality, cost effective security solutions for the maritime community. We invest in our well-maintained logistic infrastructure to enhance customers’ business continuity through the protection of their assets and people. For more information click here.


By Steve Mair

Senior Cyber Security Consultant

Share this article


Your free global geopolitical
risk dashboard

PGI’s Risk Portal tool provides daily intelligence feeds, country threat assessments and analytical insights, enabling clients to track, understand and navigate geopolitical threats.

The Risk Portal gives users up-to-date information and analysis on global affairs.

The Risk Portal allows users to visualise information in a unique and instantly understandable way. Mapping filters enable the visualisation of incidents by threat category, time period, perpetrator and target type.

Risk Portal users can upgrade their accounts to include the Report Builder and Country Profile Generator features. The Report Builder allows users to select information, data and images from the Risk Portal and create bespoke reports and emails.

Subscribers to PGI’s Bespoke services receive tailored analysis on specific sectors and geographies of interest, delivered at a frequency they determine.

Visit the Risk Portal

Subscribe to our Cyber Bytes Newsletter

Keep yourself in the loop with PGI by signing up to our Monthly Cyber Bytes email. You will receive updates, tips and narrative around what has been happening in the world of information security.

Get in touch today

For more information on how we can help you or your business, please contact us via:

Related News

CISMP, CISSP and CISM - what's in an acronym?

20 Mar 2017

There is a wide range of different security courses available, and a mind-boggling array of certific...

Read news article

International Womens Day - Pioneering Women in Tec...

08 Mar 2017

Pioneering Women in Technology – Katherine JohnsonThe Oscar season has been and gone. The...

Read news article

Law Firms and why they need cyber security

06 Mar 2017

Suffering a data breach can be devastating for any company but for law firms the impacts can be part...

Read news article
Back to the News Hub

Follow us

+44 (0)207 887 2699
©2017 PGI - Protection Group International Ltd. All rights reserved.
PGI - Protection Group International Ltd is registered in England & Wales, reg. no. 07967865
Registered address: Cascades 1, 1190 Park Avenue, Aztec W, Almondsbury, Bristol BS32 4FP