In an increasingly digital world, understanding the language of cyber risk is essential. At Canopius, we recognise that cybersecurity can often feel complex and technical — especially when navigating the evolving threats and technologies that shape today’s digital landscape.
This Cyber glossary is designed to provide clear, accessible definitions of key cybersecurity terms. Whether you’re a policyholder, broker, or simply looking to better understand the risks and protections associated with Cyber insurance, this resource will help you make informed decisions with confidence.
Endpoint security is the protection of individual devices, or “endpoints,” such as laptops, smartphones, tablets, and servers, from cyber threats. Endpoint security solutions prevent unauthorised access and detect malicious activity before it can cause harm. It’s a crucial layer of...
XDR, otherwise known as extended detection and response, is a security technology that unifies multiple security products into one integrated platform. It provides a comprehensive view of threats across an organisation’s entire infrastructure. Unlike traditional security tools that operate in...
Endpoint Detection and Response, or (EDR), is a cybersecurity solution that helps to detect, investigate, and respond to advanced threats targeting endpoints, such as computers and servers. Unlike traditional antivirus software, EDR provides continuous monitoring and analysis of endpoint activity...
What is Endpoint Protection Platform (EPP)? An Endpoint Protection Platform (EPP) is a security solution designed to protect endpoints such as laptops, desktops, servers, and mobile devices from cyber threats. It serves as a frontline defence, detecting and blocking malware,...
Ransomware recovery is the process of restoring systems and data after a ransomware attack. Ransomware is a malware type that encrypts files and will then demand a ransom for their release. This kind of attack can cripple a business, locking...
A DDoS (Distributed Denial of Service) attack is typically described as a malicious attempt to disrupt the normal traffic of a network, server, or service. It overwhelms the target with a substantial amount of internet traffic from multiple sources, causing...
Ransomware is a form of malicious software that infects devices, encrypts data, and demands a ransom for its release. By developing an understanding of how ransomware spreads, you’ll be able to protect your systems and data from these attacks. Ransomware...
A network access control list (otherwise known as an ACL) is a set of rules used to manage and filter traffic in a network. It acts as a security layer, controlling the flow of inbound and outbound data by allowing...
© 2025 Canopius
Privacy & Cookie Policies • Terms & Conditions • Canopius Tax Strategy • Modern Slavery Statement
Canopius Australia-Pacific Policies
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behaviour or unique IDs on this site. Not consenting, or withdrawing consent, may adversely affect certain features and functions.
Staff Bio Content