32 Cybersecurity terms and acronyms you need to know
Whether you’re a seasoned IT pro or just starting your digital journey, understanding the language of cybersecurity is essential. Our ABCs of Cybersecurity infographic breaks down 32 key terms-from threats like phishing and ransomware to solutions like BCDR and encryption-so you can navigate today’s cyber landscape with confidence.
Click through the tabs – Threats, Solutions, and People – to explore each category and build your cybersecurity vocabulary one letter at a time.
A cyber attack in which an advanced (possibly state backed) hacker or bad actor targets a specific organization for a long period of time by staying hidden in a network.
A policy allowing employees to use personal devices to access company resources.
An event that occurs when information is accessed and/or exfiltrated by an unauthorized person or entity, like a hacker, without the knowledge of the organization from which it came.
A type of attack in which a network is flooded with traffic from multiple sources to overload it and cause a service disruption.
The process of converting plaintext into ciphertext using a secret key.
Also known as a bad actor or threat actor. An individual who uses a computer system to gain unauthorized access to an account or system for data.
A cybersecurity attack that involves hackers using the targets existing and known hardware and/or software resources to engage in malicious activity.
Also known as malicious software that is designed to cause harm to a computer system or network.
The most common form of cybercrime in which a hacker or bad actor attempts to gain access to personal and/or company data. Phishing typically occurs via email with links containing malware.
A form of malware where bad actors encrypt information on a computer system so users are unable to access their own data and demand payment in exchange for giving back the information.
A big-picture snapshot of your current cyber risk exposure – revealing vulnerabilities and uncovering opportunites to improve defenses.
A cyber-attack that infiltrates information systems through previously unknown vulnerabilities in software and/or firmware. When a company updates any server, device, or system there is a risk of potential incidents in vulnerable areas within the update.
Software used to identify and isolate (quarantine) viruses, worms, and other malicious software from endpoints (laptop, servers, mobile devices, etc.)
A solution to reduce business downtime, mitigate legal ramifications, and save SMBs from losing money as the result of disasters, whether natural or human made.
The delivery of computing services, including servers, storage, databases, and software, over the internet.
A form of insurance that protects businesses and individuals from financial loss from cyber attacks or incidents.
A documented procedure for an organization to follow to recover from a disaster that impacts normal operations.
A tool that identifies and investigates threats to a business’s endpoints. EDR solutions replace traditional Anti-virus software by offering more security.
An advanced security technology that combines multiple security tools and data sources to provide a more thorough and comprehensive look inside your organization’s security posture.
A network security system that monitors and controls incoming and outgoing network traffic based on security rules.
A formal, documented, and organized approach to managing the effects of a security incident or cyberattack.
A cybersecurity solution that uses EDR monitored 24/7/365 using trained expert humans (SOC) to provide a more complete cybersecurity defense.
A security method used to add a second layer of authentication when accessing accounts and/or devices. In addition to a username and password, MFA also requires codes, biometrics, or other information to sign into an account.
A cloud based zerotrust architecture which requires no onpremise hardware.
A log monitoring and archiving tool that provides your business with the ability to identify threats and anomalies in real time, or to investigate historic network, system, and user activities.
A technology that gives users access to multiple accounts with just one set of login credentials. SSO simplifies the login process and reduces the risk of poor password hygiene, like weak or reused passwords.
A remote connection method used to obfuscate all network traffic using strong encryption. VPN is often used to access a corporate network, or add security and privacy when using public networks such as in airports or hotels.
A service that routinely scans for and patches weak points in your system that could be exploited. The process provides real-time visibility into potential flaws so they can be prioritized and addressed before they pose a serious risk.
A senior-level executive who is responsible for managing the security of a company’s information and technology.
An MSP (Managed Services Provider) with a focus on security. MSSPs provide services like cybersecurity, BCDR, network monitoring, and more.
A centralized location where a team of IT professionals monitor and manage the performance and security of remote monitoring and management software.
A 24/7/2365 operation staffed by expert humans who review incoming security alerts and takes immediate action to isolate and remediate potential threats before they can cause significant damage.
A cyber attack in which an advanced (possibly state backed) hacker or bad actor targets a specific organization for a long period of time by staying hidden in a network.
A policy allowing employees to use personal devices to access company resources.
An event that occurs when information is accessed and/or exfiltrated by an unauthorized person or entity, like a hacker, without the knowledge of the organization from which it came.
A type of attack in which a network is flooded with traffic from multiple sources to overload it and cause a service disruption.
The process of converting plaintext into ciphertext using a secret key.
Also known as a bad actor or threat actor. An individual who uses a computer system to gain unauthorized access to an account or system for data.
A cybersecurity attack that involves hackers using the targets existing and known hardware and/or software resources to engage in malicious activity.
Also known as malicious software that is designed to cause harm to a computer system or network.
The most common form of cybercrime in which a hacker or bad actor attempts to gain access to personal and/or company data. Phishing typically occurs via email with links containing malware.
A form of malware where bad actors encrypt information on a computer system so users are unable to access their own data and demand payment in exchange for giving back the information.
A big-picture snapshot of your current cyber risk exposure – revealing vulnerabilities and uncovering opportunites to improve defenses.
A cyber-attack that infiltrates information systems through previously unknown vulnerabilities in software and/or firmware. When a company updates any server, device, or system there is a risk of potential incidents in vulnerable areas within the update.
Software used to identify and isolate (quarantine) viruses, worms, and other malicious software from endpoints (laptop, servers, mobile devices, etc.)
A solution to reduce business downtime, mitigate legal ramifications, and save SMBs from losing money as the result of disasters, whether natural or human made.
The delivery of computing services, including servers, storage, databases, and software, over the internet.
A form of insurance that protects businesses and individuals from financial loss from cyber attacks or incidents.
A documented procedure for an organization to follow to recover from a disaster that impacts normal operations.
A tool that identifies and investigates threats to a business’s endpoints. EDR solutions replace traditional Anti-virus software by offering more security.
An advanced security technology that combines multiple security tools and data sources to provide a more thorough and comprehensive look inside your organization’s security posture.
A network security system that monitors and controls incoming and outgoing network traffic based on security rules.
A formal, documented, and organized approach to managing the effects of a security incident or cyberattack.
A cybersecurity solution that uses EDR monitored 24/7/365 using trained expert humans (SOC) to provide a more complete cybersecurity defense.
A security method used to add a second layer of authentication when accessing accounts and/or devices. In addition to a username and password, MFA also requires codes, biometrics, or other information to sign into an account.
A cloud based zerotrust architecture which requires no onpremise hardware.
A log monitoring and archiving tool that provides your business with the ability to identify threats and anomalies in real time, or to investigate historic network, system, and user activities.
A technology that gives users access to multiple accounts with just one set of login credentials. SSO simplifies the login process and reduces the risk of poor password hygiene, like weak or reused passwords.
A remote connection method used to obfuscate all network traffic using strong encryption. VPN is often used to access a corporate network, or add security and privacy when using public networks such as in airports or hotels.
A service that routinely scans for and patches weak points in your system that could be exploited. The process provides real-time visibility into potential flaws so they can be prioritized and addressed before they pose a serious risk.
A senior-level executive who is responsible for managing the security of a company’s information and technology.
An MSP (Managed Services Provider) with a focus on security. MSSPs provide services like cybersecurity, BCDR, network monitoring, and more.
A centralized location where a team of IT professionals monitor and manage the performance and security of remote monitoring and management software.
A 24/7/2365 operation staffed by expert humans who review incoming security alerts and takes immediate action to isolate and remediate potential threats before they can cause significant damage.