FAQ

Frequently Asked Questions

FAQ

General Questions

How Does Good Cyber Security Operate?

It depends on your risk profile and risk tolerance.

How Is Encryption Different From Hacking?

Encryption is used to ensure privacy.
It is important to use strong encryption algorithms and implement encryption correctly to ensure that hackers won’t be able to break it in foreseeable time.

Do Mobile Devices Present Security Risks?

Mobile devices are less secure than desktop/laptop computers by design.

My computer/phone was hacked. What should I do now?

Once you confirmed that your device was hacked, best is to contact professionals for help.
Create list of critical accounts that you want to protect.

Change passwords of all accounts that you suspect to be exposed to hackers.
Do the same for ALL other accounts where you used the same password.

How to secure my home WiFi?

Choose a good brand for your home router.

Set up your router correctly.

Limit remote access to your WiFi router.

Set up strong WiFi password on your router.

How can I become cyber security pro?

Cyber security is a broad term for many professions.
First decide which area you are the most comfortable with:

  • Defence
  • Offensive (hacking/penetration testing)
  • Training others
  • Compliance
  • Governance
  • Risk Management

Still Confused How We Can Support You?

Contact us to arrange free audit/consultation.
Our experts will listen to you and guide you in the process
of making your business resilient to cyber attacks.

Our News

Latest News

Copyright © 2024, Sigility sp. z o.o. All rights reserved