Have a Question?
-
General Security FAQs
- How do I stop phone scams?
- What does cyber security training involve?
- Why do businesses need cyber security training?
- Do I need antivirus on my mobile phone?
- Where Can I Get Free Cyber Security Advice?
- Are security assessments needed within education settings?
- Do I need to worry about security of cloud-based systems we use?
- We’re a small company do we need to worry about cyber security?
- I have anti-virus software do I need more than this?
-
Our Services
-
Securing your business
- What does cyber security training involve?
- Why do businesses need cyber security training?
- How do I secure Amazon Web Services?
- How can we secure Google Workspace (G-Suite)?
- What is the Best Antivirus Software?
- Who Should Be Responsible for Security in a Business?
- What is Microsoft SecureScore?
- What Does a Virtual CISO Do?
- How Secure Are Chromebooks?
- Can I Use the Same Password Everywhere?
- What is a Vulnerability Assessment?
- What is Disaster Recovery?
- How Long Should My Password Be?
- What is a Password Manager?
- How Often Should I Change My Password?
- What is a Business Continuity Plan?
- Show all articles ( 1 ) Collapse Articles
-
Standards & Frameworks
- Does ISO 27001 Cover GDPR?
- What is HIPAA?
- What is PCI DSS?
- How is Cyber Essentials Assessed?
- What are the ISO 27001 Controls?
- How Long Are Cyber Essentials Certificates Valid For?
- Does Cyber Essentials Cover GDPR?
- What is Cyber Essentials?
- What is the Difference Between Cyber Essentials and Cyber Essentials PLUS?
- What are the benefits of ISO 27001?
- What is ISO 27001?
-
Laws & Regulations
-
Cyber Security Glossary
- What is Tailgaiting?
- What is PreTexting?
- What is Scareware?
- What is Baiting?
- What is Penetration Testing?
- What is Ethical Hacking?
- What is XSS?
- What is WAF?
- What is VPN?
- What is TVM?
- What is SSO?
- What is SQLI?
- What is SOAR?
- What is SIEM?
- What is RBAC?
- What is RAT?
- What is PCI-DSS?
- What is OSINT?
- What is NIST?
- What is NCSC?
- What is MFA?
- What is MAC?
- What is ISO?
- What is IPS?
- What is IOT?
- What is IOC?
- What is IDS?
- What is HTTPS?
- What is HIPAA?
- What is GDPR?
- What is EDR?
- What is DLP?
- What is DDoS?
- What is DOS?
- What is DAC?
- What is CVSS?
- What is CND?
- What is CISSP?
- What is CISO?
- What is the CIA Triad?
- What is AV?
- What is AC?
- What is APT?
- What is 2FA?
- What is a Virtual CISO or vCISO?
- What is Blue Teaming?
- What is Purple Teaming?
- What is a Zero-Day Vulnerability?
- What is a Zero-Day Attack?
- What is XSS (Cross-Site Scripting)?
- What is a Worm?
- What is White Teaming?
- What is Whaling?
- What is a Watering Hole Attack?
- What is Vulnerability?
- What is a VPN (Virtual Private Network)?
- What is a Virus?
- What is URL Injection?
- What is a Trojan?
- What is a Threat Actor?
- What is Steganography?
- What is SQL Injection?
- What is Spyware?
- What is Website Spoofing?
- What is Spear-Phishing?
- What is Spam?
- What is Social Engineering?
- What is Smishing?
- What is Single Sign-On (SSO)?
- What is Sextortion?
- What is a Sandbox?
- What is Salting?
- What is an RPO (Recovery Point Objective)?
- What is a Rootkit?
- What is a Remote Access Trojan (RAT)?
- What is Red Teaming?
- What is Ransomware?
- What is PII (Personally Identifiable Information)?
- What is a firewall?
- What is "cyber security"?
- Show all articles ( 65 ) Collapse Articles
-
Cyber Threats
What is DLP?
Created On
Last Updated On
byadmin
0 out of 5 stars
5 Stars | 0% | |
4 Stars | 0% | |
3 Stars | 0% | |
2 Stars | 0% | |
1 Stars | 0% |
You are here:
< All Topics
DLP is the acronym for “Data Loss Protection”.
Was this article helpful?
0 out of 5 stars
5 Stars | 0% | |
4 Stars | 0% | |
3 Stars | 0% | |
2 Stars | 0% | |
1 Stars | 0% |
5