Cybersecurity Definitions

Managed IT Services

Managed IT Services: Where an organization outsources all of its IT responsibilities to a third-party provider – often a managed service provider (MSP). The MSP handles daily operations like help desk support, network management, cybersecurity, cloud services, and IT consulting. Their goal is to proactively prevent issues before they disrupt

Multi-factor Authentication

Multi-factor Authentication (MFA): A security measure that requires more than one method of authentication to verify a user’s identity, typically combining something you know (password) with something you have (smartphone or token). Related term: Device Code Phishing

Patch Management

Patch Management: The routine practice of applying software updates provided by vendors. Patch management fixes bugs, closes security gaps, and enhances the functionality of applications and operating systems. Related term: Endpoint Security

Phishing

Phishing: A manipulation technique used by cybercriminals to deceive individuals into divulging confidential information, bypassing security measures, or performing actions that compromise the security of an organization. In this technique, bad actors leverage psychological manipulation. Related term: Smishing

Ransomware

Ransomware: A cyberattack where bad actors encrypt an organization’s data and demand payment to restore access. Attackers often leverage phishing emails to trick their victims into clicking on an attachment, which runs malicious software that takes over their computer. Major types: Crypto, lockers, scareware, Ransomware-as-a-Service, and leakware/doxware. Ransomware examples: WannaCry,

Security Operations Center

Security Operations Center (SOC): A centralized team of professional in an organization responsible for monitoring, detecting, responding to, and preventing cybersecurity threats. Simply put, it’s the human intelligence behind a business’s cybersecurity. Key functions: Threat intelligence, real-time monitoring, threat hunting, and rapid incident response Related term: Threat Detection

Simulated Phishing Campaign

Simulated Phishing Campaign: Training exercises where your organization sends employees realistic – but fake – phishing emails to test their skills at recognizing and reporting threats. Regular phishing testing helps improve your organization’s security awareness and protects against one of today’s most common cyber threats. Related term: Cybersecurity Awareness Training

Smishing

Smishing: A type of phishing attack that occurs via SMS text messages. Attackers pose as legitimate sources to trick recipients into clicking malicious links, attempting to get their victims to divulge sensitive information or download malware onto their devices. Related term: Vishing

Social Engineering

Social Engineering: A manipulation technique used by cybercriminals to deceive individuals into divulging confidential information, bypassing security measures, or performing actions that compromise the security of an organization. In this technique, bad actors leverage psychological manipulation. Related term: Phishing

Threat Detection

Threat Detection: The process of identifying potential cybersecurity threats within a network or system, such as malware, unauthorized access, or suspicious activity. It involves using tools, monitoring systems, and security practices to spot early warning signs of an attack. Threat detection allows organizations to respond quickly and prevent damage before