Like many technical industries, cybersecurity has a lot of specialized lingo. But there are two dozen cybersecurity terms in particular that are critical to understand. We’ve defined them here (in alphabetical order) and linked to a few articles that may help you better understand them along the way.
According to Heimdal Security, “Botnets are entire networks of computers controlled and instructed to...attack other computers, send spam or phishing emails, deliver ransomware, spyware, or [perform] many other similar malicious acts.”
Our research has shown that companies with a higher number of botnets (or a BitSight Botnet Grade of “B” or lower) are twice as likely to experience a publicly disclosed data breach. You can read more about these findings in our BitSight Insight report How Do Botnet Grades Correlate With Significant Data Breaches?
5. Continuous Monitoring
Cyber risk is a major part of every vendor risk management (VRM) program. But traditional risk assessment methodologies—like on-site assessments, audits, penetration tests, and vulnerability scans—only provide you with a cybersecurity snapshot of the exact moment they were performed.
Continuous monitoring is used to describe a solution—like BitSight Security Ratings—that gives you a constant, real-time look into your network and your vendors’ networks for observing any potential vulnerabilities.
A data breach has taken place when confidential or personally identifiable information (PII) has been compromised in any way. Unfortunately, it’s almost impossible to fully prevent a data breach from happening—but there are some best practices you can put in place to reduce the risk of a hack and make sure a data breach in your organization wouldn’t be catastrophic.
Distributed denial-of-service (DDoS) is an attack vector that happens when a bad actor creates a slew of traffic requests on a website at once in order to crash it or severely cripple it for a period of time. This impacts information availability or creates a noticeable disruption in service—which is often the hacker’s intent
Encryptionis defined as the “activity of converting data or information into code.” Encrypting critical data is an important step in preventing large-scale data leakage from a cybersecurity breach. If the data is encrypted, a bad actor may have access to the data but may not be able to harvest it in a useable form.
Exploitation is typically discussed in regard to software vulnerabilities that hackers are able to take advantage of. Consider this Heimdal Security statistic: “99% of computer users are vulnerable to exploit kits (software vulnerabilities).”
Malicious software—or malware—is one of many types of attacks a bad actor can use to exploit a software vulnerability in order to gain access to data or systems. All 350 North American Eddie Bauer retail locations as well as 20 properties managed by HEI Hotels were affected by point-of-sale (PoS) malware attacks recently.
A man-in-the-middle (MITM) attack is when a hacker intercepts communication between two (or more) parties and relays the information to both sides. Common vulnerabilities like POODLE facilitate MITM attacks.
To conduct a phishing attack, a bad actor tries to impersonate either a legitimate person or a corporation through an email that asks the user to take an action. This action would give the “phisher” an access point to critical data or information.
Spear phishing is a more targeted form of phishing. The bad actor will usually pose as a trusted individual from the victim’s own company or assume the identity of an authority figure to give their email the gravitas it needs.
Whaling is similar to phishing and spear phishing, but the target is an important person or a high-profile individual, like a C-level executive or a celebrity. The methods used to phish them are usually highly personalized.
SPF, DKIM, and DMARC are email authentication protocols that reduce the likelihood of employees falling victim to phishing attacks by quarantining suspicious emails to spam folders. Proper application of these email authentication protocols will help lower the chances of a breach.
Third-party cyber risk management—or vendor risk management (VRM)—is the process of measuring and mitigating threats and risk that vendor relationships pose to your information, network, and organization.
What’s the biggest struggle your vendor risk managers face when establishing cyber security monitoring processes? From sudden increases in the use of third-parties by your organization, to not knowing which vendors might be impacted by the...
If you’re using a “one-size fits all” approach to managing your vendor lifecycle, you are missing opportunities to save money and operate more efficiently. Vendor management efficiencies don’t end in the onboarding stage: using a...
If you’re experiencing frustrating delays and procedural roadblocks during your vendor management process, you’re not alone. Security managers are seeing an increase in the number of third-parties integrating with their business, and ...