This is email based cyberattack that tricks users into giving up personal information
What is Phishing?
This type of software scans endpoints for vulnerabilities?
What is a Vulnerability Scanner?
This service provides a comprehensive picture of vulnerabilities for prioritization to facilitate timely remediation of vulnerabilities across the environment.
What is Managed Vulnerability Management (MVM / AKA VMaaS)?
This authorized simulation of a cyber attack helps to identify exploitable vulnerabilities in your systems.
What is a Penetration Test?
This critical cybersecurity capability responsible for monitoring, detection & response, commonly abbreviated SOC
What is Security Operations Center?
This type of malware encrypts files and demands payment for decryption.
What is ransomware?
This security tool continuously monitors endpoints for suspicious activities and provides real-time detection of threats.
What is Endpoint Detection and Response (EDR)?
This service protects endpoints, such as desktops, servers, laptops, and virtual machines, extending security from known signatures to patters to detect & prevent sophisticated attacks on the endpoint.
What is Managed Endpoint Detection & Response (MEDR)?
This services assesses Active Directory hardening, endpoint CIS compliance, vulnerabilities, and provides a one-time dark web scan.
What is a Foundational Security Assessment (FSA)?
A cybersecurity framework operating under the principle "Never trust, always verify"
What is Zero-Trust?
This attack targets business by compromising or impersonating executive email accounts, often to authorize fraudulent wire transfers.
What is Business Email Compromise (BEC)?
Security Teams use this technology to collect, analyze and correlate security alerts from multiple sources.
What is a Security Information and Event Management system (SIEM / aka XDR)?
This service is designed to establish a base level of cybersecurity via an upfront Foundational Security Assessment (FSA) paired with quarterly vulnerability scans and consultation to enable organizations establish a baseline of security.
What is Security Advisory as a Service (SAaaS)?
This facilitated exercise tests your knowledge and execution of your incident response plan to help enable collaboration and identify gaps in a lower stress environment.
What is a Tabletop Exercise?
A business model where ransomware developers lease their malware to affiliate who conduct attacks and share profits.
What is ransomare-as-a-service (RaaS)?
These attacks trick individuals into breaking normal security procedures by exploiting human psychology rather than technological vulnerabilities.
What is social engineering?
This technology creates a logical isolated virtual environment to safely execute suspicious files or code?
What is a sandbox?
This service offers a combination of expertise and technology to detect dynamic threats quickly across your entire technology ecosystem.
What is Managed Detection & Response (MDR)?
This analysis identifies discrepancies between your current security posture and desired state against regulatory requirements or security frameworks.
What is a gap assessment (aka risk assessment)?
Proactively searching through networks to detect advanced threats that evade existing security solutions.
What is threat hunting?
This increasingly comon attack method targets trusted third-party vendors or software providers to compromise their customers, allowing attackers to affect multiple organizations with a single breach.
What is Supply Chain Attacks?
This cloud security technology can identify and remediate misconfigurations.
What is Cloud Security Posture Management (CSPM)?
This service actively searches, scans, and collects data from dark web sources to identify potential cybersecurity threats and stolen information.
What is dark web monitoring?
This emergency services helps organizations rapidly investigate, contain and remediate active security breaches to minimize organizational damage.
What is Incident Response?
Identifying, analyzing, and monitoring an organization's digital attack surface.
What is Attack Sruface Maangement (ASM)?