multiracial business people

Common Cybersecurity Terms & Threats

Share on facebook
Share on twitter
Share on linkedin

Cybersecurity awareness is important for anyone.  Whether you’re a business, an employee, parent, or senior, you should be informed on common cybersecurity terms, know how to spot threats, and what to do if you come across one.  If you’re connecting any device, it’s important to protect it.

Security is the responsibility of everyone that uses technology.  From computers, to mobile devices and tablets, to other devices that connect to the internet.  By being aware and diligent to threat that you may receive – and how to handle them.  Here are a few items to consider and think about in protecting yourself while online.

Common Cybersecurity Terms & Threats

 

Phishing

Where a threat actor sends Emails disguised to be from companies or individuals in order to gather personal information such as passwords and credit card numbers.  These attacks can also contain attachments that can install applications on your devices, and some can contain Ransomware applications as well.New call-to-action

Vishing

Voice Phishing: Where a threat actor will make calls or leave messages disguising themselves to be from companies or individuals in order to gather personal information such as passwords and credit card numbers.  You have probably received the calls like: your car policy is about to expire or Your google account is going to expire

Smishing – Where a threat actor uses text messaging disguising themselves to be from companies or individuals in order to gather personal information such as passwords and credit card numbers.

Ransomware

We have probably all heard about this topic.  In the early years, these types of attacks were designed to directly attack individuals a started with a $300.00 ransom.  Today, the threat actors have upped their game and are attacking businesses as they can pay higher ransoms.  Some companies have reported ransoms with 6 figures.

By opening a suspicious link or attachment that you receive through an email is one of the ways that threat actors will entice an individual to start the process.

2 Factor Authentication (2FA) or Multi-factor Authentication (MFA)

The use of a second method of authenticating your accounts is another layer of protection from getting compromised.  This method is considered “something you have”.  Most online services will have this available for activation.

  • Email Accounts
  • Social Media Accounts
  • Banking Accounts
  • Utilities Accounts
  • Any additional Critical accounts

Staying vigilant in protecting your personal and business information is critical when connected to the internet. Hopefully understanding these cybersecurity terms & threats will help you do Your Part. #BeCyberSmart

New call-to-action

Jack Poltorac, Virtual CISO

Sign up for our Newsletter