This refers to the practice of ensuring the integrity, confidentiality and availability of information.
Cyber Security
This type of malware is aimed to corrupt, erase or modify information on a computer before spreading to others.
Virus
This type of malware is a software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
Email Phishing
This is already on your SCL Computer, but you should make sure your personal computer has it to prevent malware from compromising your system.
Antivirus (AV) software
This social engineering attack is the most common type of attack using email.
Phishing
A way to secure private information by encoding it so only approved parties can decrypt and access it.
Data Encryption
This type of malware deliberately prevents you from accessing files on your computer and holding your data hostage.
Ransomware
Criminals who do this will already have a person’s name, place of employment, job title, email address and specific information about their job role.
Spear Phishing
This needs to be updated regularly to prevent criminals from exploiting weaknesses.
Programs and operating systems
In these social engineering attacks, someone without proper authentication follows an authenticated associate into a restricted area.
Tailgating (piggybacking)
This allows you to create a secure connection to another network by using the internet.
Cloud (cloud computing)
This type of malware often allows a hacker to gain remote access to a computer through a “back door”.
Trojan Horse
With this phish, telephones replace emails as the method of communication.
Vishing (voice phishing)
This technology allows computers and other devices to communicate over a wireless signal.
WiFi Network
This social engineering attack uses a false promise to pique a victim’s greed or curiosity. They lure them into a trap that steals their personal information or inflicts their system with malware
Baiting
This is the delivery of different services through the Internet.
Virtual Private Network (VPN)
This type of malware can replicate itself in order to spread the infection to other connected computers.
Worm
This phish attempts to imitate senior executives.
Whaling
You should use this when you are connecting to public WiFi networks. SCL requires it when accessing data remotely.
Virtual Private Network (VPN)
This social engineering attack focuses on creating a fabricated scenario to convince a victim to give up valuable information.
Pretexting
The act of taking advantage of human trust to gain access to private information.
Social Engineering
This type of malware is a software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
Bot/Botnet
This new attack uses social media to trick people. Criminals use fake URLs, posts, tweets and IM to persuade people to divulge sensitive information or download malware.
Angler Phishing
If you get emails with any suspicious links or attachments, you should forward them to this SCL Email.
phishing@sclhealth.org
This attack baits a target with the promise of a service or benefit in exchange for information or access. For example, request their victim to disable their AV software temporarily to install a malicious application.
Quid Pro Quo