This type of online scam involves fradulent attempts to obtain sensitive information by masquerading as a trustowrthy entity in electronic communication using fear and urgency.
What is phishing?
This is a cloud-based service model where a third-party provider manages and monitors the security of your network and data.
What is security as a service?
This hacker is a cybercriminal who breaks into computer systems with malicious or criminal intent.
What is a black hat hacker?
This is a security measure that requires users to provide two forms of identification in order to access an online account.
What is two-factor authentication?
This type of cybersecurity solution focuses on detecting and responding to threats that occur on endpoint devices such as laptops, desktops, and servers.
What is endpoint detection and response (EDR)?
This type of social engineering attack lowers your guard by you initiating contact.
What is baiting?
This technology helps protect computer networks from unauthorized access and cyberattacks by monitoring and controlling incoming and outgoing network traffic.
What are firewalls?
These are authorized cybersecurity experts who use their skills to find vulnerabilities in organizational networks and computer systems.
What is a white hat hacker?
A tool used to securely store and manage passwords for multiple accounts.
What is a secure password database or password manager?
A facility that is responsible for monitoring, detecting, and responding to cybersecurity incidents and threats, using advanced technologies and staffed by security analysts and incident responders.
What is a security operations center?
The term used to describe an incident in which an unauthorized individual or entity gains access to a computer system, network, or sensitive information.
What is a security breach?
A service that helps organizations stay aware of potential data breaches and cyber threats by monitoring underground forums and other hidden areas of the internet.
What is dark-web monitoring?
This person engages in hacking activities for the pure enjoyment of finding gaps in computer systems, and they might even let the owner know if any weak points are found.
What is a grey hat hacker or "just for fun" hacker?
This is a plan that outlines an organization's strategy for reducing the risks of cyberattacks as well as protocols for responding to security incidents and restoring normal operations.
What is a cyberattack mitigation plan?
The process of identifying and evaluating weaknesses or potential vulnerabilities in a computer system, network, or application.
What is a vulnerability assessment?
This type of social engineering attack involves the use of telephony to trick victims into providing sensitive information such as credit card numbers or login credentials.
What is vishing?
This is a type of software that helps protect computers and networks from malicious software by detecting and removing them before they can cause damage, and often includes features such as real-time scanning.
What is anti-malware software?
These individuals employ a cyberattack from within the organization they work for.
What is a malicious insider or whistleblower hacker?
The process of making copies of important data and storing them in a separate location, to ensure that data can be recovered in the event of data loss or corruption.
What is data backup?
This technology helps protect email accounts from potentially harmful messages by automatically detecting and blocking spam.
What is web filtering anti-spam?
This kind of scam has the attacker create a false scenario in order to lure a victim into a vulnerable situation and to trick them into giving private information.
What is pretexting?
A technology that helps protect sensitive data from unauthorized access by converting it into an unreadable format that can only be deciphered with a decryption key.
What are data encryption services?
These hackers are hired by organizations to bug-test a new software or system network before it’s released.
What is a blue hat hacker?
This practice helps protect your computer from cyber threats by installing the latest software updates and security patches, often including bug fixes and vulnerability patches.
What is updating your devices?
This service tests your employees’ security awareness when confronted with an unauthorized third-party attempting to manipulate the employee into disclosing confidential information.
What is on-site social engineering?