Would you know the difference between ransomware and malware?
It’s okay, most of us don’t. However, when it comes to protecting your business, it is important that you familiarise yourself with some of the terms being used in the headlines and security blogs that are published online.
We have listed 10 cyber security buzzwords that we feel are the most relevant at the moment.
Firewalls are defensive protection that monitors incoming and outgoing data. All traffic either coming out or entering the network must pass through the firewall and is checked, either by allowing, filtering, limiting or even rejecting. Firewalls have been a first line of defence in network security for over 25 years.
A keylogger collects information about the keystrokes of a victim. This information will be collected and potentially be misused by a third party. Most keyloggers are software-based, they are applications that are accidentally downloaded by the victim. A Key Logger with increased complexity could even log data you copy and paste or collect GPS location, audio, or phone call logs and screengrabs.
Data Loss Prevention
This is the term used as the last point of defence in cyber security. Could be a strategy or software that the security team has put together to prevent data being lost completely in case of attacks as well as physical events that could compromise data.
Securing digital data using one or more mathematical techniques along with a password or key to decrypt the information.
This is cyber security technology that requires multiple methods of authentication from independent categories of credentials to verify a user’s identity for a login or other transaction. This could be a code or message sent to your mobile phone, an email or even a biometric method like a fingerprint.
The practice of securing endpoints such as desktops, laptops, and mobile devices from being exploited by malicious users. Endpoint security systems protect these endpoints on a network or in the cloud from cybersecurity threats.
A defensive cyber security technique that is essentially a computer/server that is set up to look like a legitimate and high-value target on a network. The aim is to entice hackers to focus on this computer and not on actual high value computers or data. The bonus is that administrators can watch hackers in the act and learn to protect against their techniques.
Phishing or Spear Phishing
A technique used by hackers to obtain sensitive information, including passwords, bank accounts or credit cards.
Often an unexpected email is received disguised as being from a legitimate source. In many cases, the hacker will attempt to trick you into either replying with the information they seek, like bank details, or tempt you to click a malicious link or run an attachment.
A specific type of malware (virus) with the primary function to prevent the user from accessing files in exchange for some sort of payment also known as ransom. The victim must pay to either remove the malware or to retrieve files from a backup that had been encrypted by the malware.
A simpler term for malicious software; Malware is software intentionally designed to cause disturbances in a computer, server, client, or computer network. Anything that contains software is at risk of malware. Other purposes of malware are to leak private information, gain unauthorized access to information or systems, deprive the user access to information or unknowingly interfere with the user’s computer security and privacy.