These days, staying on top of the latest news of cybersecurity threats and data breaches is really hard. Not understanding the basic lingo makes it even harder!  Here's a list of 10 Cybersecurity terms you need to know so you can start taking measures to protect yourself and your business!


10 Cybersecurity Terms You Need to Know NOW!

Breach

  • The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.

Cloud

  • A technology that enables users access to files and/or services through the internet from anywhere in the world. Technically speaking, it’s a collection of computers with large storage capabilities that remotely serve requests.

Firewall

  • A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based. A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet.

Malware

  • Malware refers to any software intentionally designed to cause damage to a computer, server, client, or computer network. Malware (ie malicious software) that uses the macro capabilities of common applications such as spreadsheets and word processors to infect data.

Phishing

  • Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication

Ransomware

  • Ransomware is malware that encrypts valuable data until a ransom is paid for its return.Ransomware typically spreads through phishing emails or by unknowingly visiting an infected website.

Spyware

  • Spyware is software that aims to gather information about a person or organization, sometimes without their knowledge, that may send such information to another entity without the consumer's consent.

Trojan Horse

  • A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. 

Two-Factor Authentication

  • An authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism.

Virus

  • A computer virus is a type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code without the users knowledge.  



Ready to protect your business?


We'd love to tell you more about how our Cybersecurity Solutions might benefit you.

STEADfast IT is the highest rated Managed Services Provider in the Northeast

Call Now Button