Frequently Asked Questions (FAQ)





Usually that is you. You are the expert on your business, so it’s usually best if it comes from you.
We offer a variety of payment options, varying from a one-time, up-front payment to six automated monthly payments. We understand that this is a big investment and want to help you budget for the expense in whatever way possible. We accept PayPal, and all major credit cards.
A risk assessment that has been assigned to a cyber threat, such as DDoS attack or a data breach. A cyber risk assessment may be either qualitative or quantitative, where the latter should estimate risk (R) as a function of the magnitude of the potential loss (L) and the probability that L will occur.
No, Anyone requesting for a demo gets it free. But it can take up to 5 or more days. So do not expect fast website delivery.
There’s not one single answer to this question. A website design is quoted based on the needs of each individual project. Every website is unique and requires different components; we design and develop custom websites specifically for your small business. We’ll ask a lot of questions, assess your needs, and give you a quote based on that assessment. Most of our sites run from 1000 euro - 7000 euro range, but can be more or less depending on needs.
You are free to buy as many websites as you like. Time is the only limit.
Yes, SSL is a must in todays cyber attacks. You need SSL to secure usernames and passwords. If you are using forms that ask for sensitive customer information, you need SSL to stop your customer data from being appropriated by cybercriminals. If you're an ecommerce site, SSL is a must to secure your website.
Encryption is a means of protecting files and devices. When you encrypt a file, you "lock" it with an encryption key or password. The file itself is scrambled and becomes unreadable without the appropriate key or password. Government are required to encrypt portable devices (laptops, tablets, smartphones, and removable storage media) and sensitive information. Cybertrigo recommends that all people should encrypt their personal devices and sensitive files to protect them from misuse. Don't leave your data defenseless against thieves and cybercriminals!
Yes, it is possible to have a virus that "hides" in BIOS and can be executed from BIOS. Current technology enables programs to write code into BIOS, which is used for storing the first piece of a program being executed when a PC boots up.
Viruses do not infect plain electronic mail messages with plain text formatting and no executable code. However, HTML emails, which can contain executable scripts as well as files attached to the email message, may be infected. Nowadays, most anti-virus software can be configured to scan emails and their attachments.
Hosting is super important! When it comes to hosting, you get what you pay for. We’ve developed a list of our absolute favorite hosts to help you find the right host at the right price.
Here are some Hosting services we use and recommend: