Common Cybersecurity Terms & Threats

Share on facebook
Share on twitter
Share on linkedin
multiracial business people

Cybersecurity awareness is important for anyone.  Whether you’re a business, an employee, parent, or senior, you should be informed on common cybersecurity terms, know how to spot threats, and what to do if you come across one.  If you’re connecting any device, it’s important to protect it.

Security is the responsibility of everyone that uses technology.  From computers, to mobile devices and tablets, to other devices that connect to the internet.  By being aware and diligent to threat that you may receive – and how to handle them.  Here are a few items to consider and think about in protecting yourself while online.

Common Cybersecurity Terms & Threats

Phishing

Where a threat actor sends Emails disguising to be from companies or individuals in order to gather personal information such as passwords and credit card numbers.  These attacks can also contain attachments that can install applications on your devices, and some can contain Ransomware applications as well.

Vishing

Voice Phishing: Where a threat actor will make calls or leave messages disguising to be from companies or individuals in order to gather personal information such as passwords and credit card numbers.  You have probably received the calls like: your car policy is about to expire or Your google account is going to expire

Smishing – Where a threat actor use text messaging to disguise to be from companies or individuals in order to gather personal information such as passwords and credit card numbers.

Ransomware

We have probably all heard about this topic.  In the early years, these types of attacks we designed to directly attack individuals a started with a $300.00 ransom.  Today, the treat actors have upped their game and are attacking businesses as they can pay higher ransoms.  Some companies have reported ransoms with 6 figures.

By opening a suspicious link or attachment that you receive through an email is one of the ways that threat actors will entice an individual to start the process.

2 Factor Authentication (2FA) or Multi-factor Authentication (MFA)

The use of a second method of authenticating your accounts is another layer of protection from getting compromised.  This method is considered “something you have”.  Most online services will have this available for activation.

  • Email Accounts
  • Social Media Accounts
  • Banking Accounts
  • Utilities Accounts
  • Any additional Critical accounts

Staying vigilant in protecting your personal and business information is critical when connected to the internet. Hopefully understanding these cybersecurity terms & threats will help you do Your Part. #BeCyberSmart

Jack Poltorac, Virtual CISO

About Applied Imaging

For over 30 years we’ve helped businesses become more efficient by managing everything in the information lifecycle – from creation to destruction and everything in between.

Recent Posts

Follow Us

Sign up for our Newsletter