New Zealand businesses recorded over four thousand cybersecurity incidents last year, including 53 per cent more scams and fraud reports compared to 2018. This resulted in businesses losing NZ$16.7m.

Cybersecurity is more important than ever. With new forms of attacks appearing every year, and so many security solutions on the market, it can be difficult to keep up with all of the different terms in play.

If you need to know your malware from your ransomware, we’ve put together a glossary of essential terms you need to understand in order to protect your organisation.

Antivirus –

A good introduction to both our glossary and the world of cybersecurity. Antivirus software is designed to prevent, detect and remove malware. If your computers aren’t running reputable antivirus software already, then you’ve got real problems.

Botnet –

A group of computers or internet-connected devices that are collectively compromised and used to perpetuate DDoS attacks (see below), or to steal data and generally wreak havoc.

Cybersecurity awareness –

These are vital training modules that ensure your employees are aware of the many cyber threats to your business, including phishing (see below) and other social engineering attacks.

DDoS (Distributed Denial of Service) –

In a DDoS attack, a botnet inundates an application, system, or website with internet traffic, making it impossible to stop the attack simply by blocking a single source. These devastating attacks can bring down even the most well-protected banking and government services.

Encryption key –

An assortment of letters, number and symbols that is purposefully created by algorithms to disarrange and rearrange data, so that each key is random and distinctive.

Firewall –

A firewall acts as a defence for your device. Depending on your security settings, firewalls manage and assess what information your device receives, and filters and blocks suspicious attempts from other users through apps to access your device.

Hacktivist –

These are attackers who hack or force their way into computers and networks, often for political or disruptive reasons. ‘Anonymous’ is the most well-known hacktivist group for their DDoS attacks on governments and other large organisations.

Insider threats –

Whether your employees intend to be or not, from the CEO all the way down, each member of staff can be considered an insider threat to your organisation’s security. Cybersecurity awareness and user monitoring are essential to maintain your company’s safety.

Keylogger –

A malicious tool that records what is typed (a keystroke) on a keyboard. Keyloggers are used to capture passwords, secret question responses, and any other sensitive information.

Logic bomb –

This is a nasty piece of code in a virus or piece of malware that will set off a malicious function in software when certain conditions are met, such as beginning to delete important files.

Malware –

A catch-all term for any type of code that has been designed specifically to cause harm in a system. This includes viruses, spyware, trojan horses, logic bombs and ransomware, among many others.

NIST framework –

The US Government’s National Institute of Standards and Technology. The NIST framework is considered cybersecurity best-practice, including its model which promotes the need to ‘identify, detect, protect, respond and recover’.

Phishing –

One of the oldest tricks in the cybersecurity handbook. Phishing involves fraudulently claiming to be an individual or business in order to gain sensitive information or financial gain. These attacks are a common form of social engineering and are usually carried out via phishing emails.

Quarantine –

A function of your antivirus software that involves storing files that may contain malware in isolation for either further examination or deletion.

Ransomware –

An increasingly popular form of malware that holds data or applications hostage on computers through advanced encryption. A demand for payment is then sent before attackers will release control of the captured data.

SIEM (Security Information and Event Management) –

A group of systems, software and managed services that provide real-time analysis of security alerts generated by applications and network hardware, while automatically identifying systems that are out of compliance with security policies.

Trojan horse –

A common form of malware where a malicious payload is imbedded inside a seemingly normal file. When this file is opened, the malicious threat is automatically unleashed into the system.

UEBA –

User and entity behaviour analytics is a growing field of software that monitors user activity data and analyses using threat intelligence to identify behaviours that could be malicious. These applications are implemented to lower the risk of insider threats.

Virus –

A well-known form of malware that attaches itself to a host file as a parasite. When this file is accessed, the virus is activated and it begins to infect other objects. The majority are engineered to infect the Windows operating system (OS), and some viruses are also designed to ensure they are impossible to detect 

Worm –

Similar to viruses in that they’re a form of malware that focuses on replication and distribution, however worms are different as they’re a self-contained malicious program. While not necessarily malicious themselves, a worm can be designed to spread other types of malware.

Zero-day vulnerability –

These are previously unknown bugs or flaws in software that provide a potential backdoor entrance for attackers. By targeting these flaws, attackers can release devastating malware before the flaw can be patched.

With so much to learn about cybersecurity, you need a partner to help you stay one step ahead of the threats your organisation faces. Datacom can help you create a robust cybersecurity strategy that includes security management (via SIEM), phishing solutions, cybersecurity awareness training, and vulnerability assessments. 

Contact us today to learn how we can help you evolve your people, processes and technology to become more resilient.

Related industries
Technology
Related solutions
Security