Build or upgrade your ISMS on our platform


The name given to a person who accesses computer networks by the backdoor. This can be for malicious intent but is just as likely to be performed by someone that is testing a system and looking for vulnerabilities to be fixed.