contact us

Learning Center
Resources on cyber security and how the lyonl works

Learning banner
Arrow down
DDoS attacks and preventions techniques

In a distributed denial-of-service (DDoS) attack, a network of computers work in tandem to overflow an access point and prevent legitimate users from accessing a service.

Devices security and privacy

The security and privacy of the devices have been a cause for concern for some time and have had the inevitable consequence of allowing small- and large-scale attacks. Most of these attacks originate from simple security problems, for example, the retention of default passwords on a service.

Bots in cybersecurity

What we call a bot is an automated application that can browse the web. Some bots are helpful—for example, search engine crawlers. But the malicious bots can harm websites and applications in many ways.

Cloud security and governance

Cloud security and governance is the management model that facilitates adequate security and operations within the cloud so that an enterprise's business targets are achieved.

Privacy protection

Privacy protection in the view of cyber security should be considered the ratio between the personal information scope processed or stored online and effective cyber security implementation by SME for personal data security both when transferred or stored.

Cyber threats and remote work

You are far more vulnerable to cyber-attacks without the security protections that office systems afford us – such as firewalls and dedicated IP addresses – and increased reliance on technology. The most obvious risk is that most of our tasks are conducted online.

Domain name system

The domain name system (DNS) is the decentralized and hierarchical naming system used to identify devices, services, and other resources you can reach through the internet. The records in the DNS associate domain names with other forms of information.