Glossary

Cybersecurity Awareness Training

Cybersecurity Awareness Training: Educating employees about common cyber threats like phishing and social engineering, as well as safe online practices. Regular security awareness training – when combined with simulated phishing exercises – reduces human error and significantly lowers the risk of security breaches. Related term: Simulated Phishing Campaign

Data Backup

Data Backup: The process of creating copies of data to prevent data loss in the event of system failure, cyber attack, or disaster. Having multiple copies ensures you have a good copy that can be used to restore your systems. Related term: Disaster Recovery

Device Code Phishing

Device Code Phishing: A new sophisticated cyberattack that exploits a legitimate login process used by trusted services like Microsoft and Google. It tricks users into granting account access to attackers – often without realizing it – by using real login pages and trusted domains. Because it bypasses multi-factor authentication and

Disaster Recovery

Disaster Recovery: An organization’s ability to restore access and functionality to its IT systems after a disruption. Examples include natural disasters, battles, system failures, and cyberattacks. It involves the tools, procedures, and policies focused on quickly recovering the systems that support critical business operations. A main component of disaster recovery

DNS Spoofing

DNS Spoofing: A type of attack where the attacker corrupts the DNS cache of a system, redirecting traffic from legitimate websites to malicious ones. Also known as DNS cache poisoning. Related term: Domain Name System (DNS)

Domain Name System

Domain Name System (DNS): The system that translates human-friendly domain names (like tealtech.com) into numerical IP addresses (like 192.0.2.1) that computers can understand. This allows Internet users to easily access websites and internet resources using memorable domain names rather than a complex IP address. Related term: DNS Spoofing

Endpoint

Endpoint: Any physical or virtual device that connects to and exchanges information with a computer network. Examples of endpoints include laptops, servers, smartphones, tablets, and IoT devices. Related term: Endpoint Security

Endpoint Security

Endpoint Security: The practices and tools that protect your devices from cyber threats, data breaches, malware, and unauthorized access. Endpoints can be exploited as entry points into business networks. So, protecting them is vital for your overall network security. Related term: Patch Management

Fileless Malware

Fileless Malware: A type of malicious software that operates entirely in memory, rather than on a traditional executable files, making it harder to detect and eliminate by traditional antivirus programs. It is often a component of Living off the Land attacks. Related term: Living off the Land

Living off the Land

Living off the Land: A cyberattack where the hacker uses legitimate tools and software already present in an organization’s system to carry out malicious activities, minimizing the chances of them being detected for long periods of time. Related term: Fileless Malware