5 Cyber Security Terms To Know
Cyber security awareness and best practices are meant for everyone in your company – not just your in-house IT person or department. But that doesn’t mean that you need to be an expert to understand how to protect your business from a cyber attack. But what is a phishing attack and how is it different from ransomware? Here is a glossary of five cyber security terms to know that will help you when speaking to your IT vendor or watching the news about a new cyber attack.
A contraction of “malicious software”, malware is a term that defines every type of attack that is intended to harm or destroy your computer and networks. A computer virus, Trojan and spyware, for example, are types of malware. Therefore, any type of software that is intentionally created to destroy or access networks and data should be referred to as malware.
A term you’ve probably heard daily, ransomware is a subcategory malware. This type of attack encodes your data until you pay the ransom. However, paying the ransom does not guarantee you’ll get the data back or that it will be free of any other types of malicious software. This is why it’s so important to have backups of your data.
Cyber attackers release malware when they discover a weakness (or vulnerability) before a developer has an opportunity to create a patch to fix it. That malware exploits one of these holes before the vulnerability is addressed, —hence “zero-day,”
Social engineering is the act of manipulating people into giving up sensitive or confidential information, either through technology or human interaction. For example, a social engineer can pretend to be a technical support person to trick a user into telling them their login credentials. The whole idea behind social engineering is to take advantage of someone’s natural instinct to help.
Phishing, a form of technical social engineering, has now become a well-known way to grab information from a victim. A cyber criminal might send an email that appears to come from a trusted source, such as a bank, asking the recipient to click on a link to check their account. By clicking on the link, though, they are taken to a fake website that looks very legitimate. When users attempt to log in, they are essentially giving up their information.
And now you know five common cyber security terms. If you want to learn more about protecting your business from cyber attacks, contact us, today!