Glossary of Cybersecurity Terms

Glossary of Cybersecurity Terms
Photo by Joshua Hoehne / Unsplash
Access Control

Security measures that restrict access to data or systems to authorized individuals only.

Antivirus

Software designed to detect, prevent, and remove malicious software or viruses from a computer.

Cyber Essentials

A UK government-backed certification scheme designed to help businesses protect against common cyber threats.

Data Breach

An incident where sensitive, protected, or confidential data is accessed or disclosed without authorization.

Encryption

The process of converting data into a secure code to prevent unauthorized access.

Firewall

A security system that monitors and controls incoming and outgoing network traffic based on predefined security rules.

Malware

Malicious software designed to damage, disrupt, or gain unauthorized access to a computer system.

Multi-Factor Authentication (MFA)

An extra layer of security that requires two or more forms of verification to access an account, such as a password and a code sent to a phone.

Password Manager

A tool that securely stores and manages passwords for various online accounts.

Phishing

A deceptive attempt to obtain sensitive information by pretending to be a trustworthy entity, typically through email or text.

Ransomware

A type of malware that encrypts files on a device, making them inaccessible until a ransom is paid.

Smishing (SMS Phishing)

This attack uses text messages to deliver phishing scams. These messages may prompt recipients to click on malicious links or enter personal information. As more employees use mobile devices for work, smishing has gained popularity.

Social Engineering

A manipulation technique used to trick individuals into giving away confidential information or performing actions that compromise security.

Vishing (Voice Phishing)

Phone calls are used to impersonate trusted sources (e.g., IT support or financial institutions). Attackers often request information under the false impression of fixing an issue or verifying account details.

VPN (Virtual Private Network)

A tool that creates a secure, encrypted connection over the internet, often used to protect data and privacy.

Whaling (CEO Fraud)

This technique targets senior executives or decision-makers. Attackers impersonate CEOs or CFOs, requesting sensitive information or financial transactions. Because these requests seem to come from high-level executives, employees may be less likely to question them..

Stay Aware, Stay Secure!
Protecting your business from cyber threats starts with awareness and proactive action. Have questions or want to strengthen your defences? Get in touch with us or sign up for our newsletter for the latest tips and updates on keeping your business secure.