As we mentioned in the 'hyperlink' - now there's a geeky word, on this page you will find some interesting and some not so interesting bits of information that you may, or may not, wish to read. 

All related, well mostly, to IT in some way or other.

From a glossary to how-tos and everything in between. Feel free to peruse at your leisure.

You have been warned!

Cybersecurity Controls Explained

Vulnerability Scans

Automated tests designed to probe computer systems or networks for the presence of known vulnerabilities that would allow malicious actors to gain access to a system.

Two-Factor Authentication

Where a user authenticates themselves through two different means when remotely logging into a computer system or web based service. Typically a password and a passcode generated by a physical token device or software are used as the two factors.

Security Info & Event Management (SIEM)

System used to aggregate, correlate and analyse network security information – including messages, logs and alerts – generated by different security solutions across a network.

Perimeter Firewalls

Hardware solutions used to control and monitor network traffic between two points according to predefined parameters.

Penetration Tests

Authorised simulated attacks against an organisation to test its cyber security defences. May also be referred to as ethical hacking or red team exercises.

Mobile Device Encryption

Encryption involves scrambling data using cryptographic techniques so that it can only be read by someone with a special key. When encryption is enabled, a device’s hard drive will be encrypted while the device is locked, with the user’s passcode or password acting as the special key.

Intrusion Detection System

A security solution that monitors activity on computer systems or networks and generates alerts when signs of compromise by malicious actors are detected.

Incident Response Plan

Action plans for dealing with cyber incidents to help guide an organisation’s decision-making process and return it to a normal operating state as quickly as possible.

Security Awareness Training

Training programmes designed to increase employees’ security awareness. For example, programmes can focus on how to identify potential phishing emails.

DNS Filtering

A specific technique to block access to known bad IP addresses by users on your network.


An internet protocol used to combat email spoofing – a technique used by hackers in phishing campaigns.

Web Content Filtering

The filtering of certain web pages or web services that are deemed to pose a potential security threat to an organisation. For example, known malicious websites are typically blocked through some form of Web Content Filtering.

Web Application Firewall

Protects web facing servers and the applications they run from intrusion or malicious use by inspecting and blocking harmful requests and malicious internet traffic.

DDOS Mitigation

Hardware or cloud based solutions used to filter out malicious traffic associated with a DDoS attack, while allowing legitimate users to continue to access an entity’s website or web-based services.

Data Loss Prevention

Software that can identify if sensitive data is being exfiltrated from a network or computer system.

Database Encryption

Where sensitive data is encrypted while it is stored in databases. If implemented correctly, this can stop malicious actors from being able to read sensitive data if they gain access to a database.

Custom Threat Intelligence

The collection and analysis of data from open source intelligence (OSINT) and dark web sources to provide organisations with intelligence on cyber threats and cyber threat actors pertinent to them.

Asset Inventory

A list of all IT hardware and devices an entity owns, operates or manages. Such lists are typically used to assess the data being held and security measures in place on all devices.

Application Whitelisting

A security solution that allows organisations to specify what software is allowed to run on their systems, in order to prevent any non-whitelisted processes or applications from running.

Advanced Endpoint Protection

Software installed on individual computers (endpoints) that uses behavioural and signature based analysis to identify and stop malware infections.

IT Questions & How-To's

How can I pin an application to my task bar in windows?

When you are logged in to an application, right button click on its icon in the taskbar and select pin to task bar.

How can I look at two documents in the same screen?

To view two documents side by side – press Windows and left arrow key in the first document. You should see your document move to the left and the other open documents will appear on the right side of your screen. Select the other document you would like to display on the right side of your screen.

What is the taskbar?

It’s the strip along the bottom of the window on your screen, that has the start menu (windows logo) on the left, the clock and date on the right, and the list of open & pinned applications inbetween.

What is a powercycle? Hard reset? Reboot? Shutdown and restart?

Turning the machine off and on again, by using turning off a switch; or hold the power button down for 10 seconds on a laptop or mobile device; or remove the power cable

Account Questions

How can I pay my invoice?

Onebytes standard terms for payment are by direct debit and we can send you a link to sign up to the mandate from our payment partner Go Cardless.

General IT Glossary

What is an MSP?

A managed service provider (MSP) is a company that remotely manages a customer's IT infrastructure and/or end-user systems, typically on a proactive basis and under a subscription model.