ABC Cybersecurity | Awareness, Behavior, Culture, the three areas of focus that will change Cybersecurity going forward. READ MORE |
Auto-Run Worm | If you pick up a USB drive in the parking lot and can’t help yourself from plugging it into your computer, it just might be what takes advantage of a Windows Auto-Run feature to slither malicious code onto your computer. Lesson, don’t plug in unknown USB drives. |
B2B | Acronym for Business to Business |
BEC | Acronym for Business Email Compromise |
Benefit Broker | A trusted adviser to companies providing resources, rates and latest benefit solutions for their employees and the business alike. |
Bitcoin | Should not be part of your Breach Preparedness plan. Bitcoin is a cryptocurrency that is considered a digital currency without a central bank or single source administrator. Transactions are through a peer-to-peer network and transparently recorded on a blockchain. |
Bot Herders | Once an attacker has successfully established a Botnet, they work to guide other systems over through conformity, to grow the size of their Herd. |
Bot Master | Bot Masters like control. By successfully infecting one internet connected device (a zombie), the Master will work diligently to recruit a second follower (another zombie), which technically now qualifies this lucky group as a Botnet. The Bot Master will use this Botnet to recruit as many zombie’s as possible and then leverage them to steal identities, spread malware, bugs, viruses, etc. |
Botnet | It starts as a zombie, one infected internet connected device, then as the hacker (or Bot Master) adds more zombies, they can say they have a Botnet. |
Brandjacking | Someone taking your ‘brand’ and using it for selfish reasons to possibly tarnish your reputation or for financial gain to them or loss to you. |
Breach | It’s too common of a word in our culture today, especially as it relates to your business. “Houston, we have a problem…” |
Breach Kit | The ole Emergency Break Glass visual. Being prepared, gathering essential documents, communication, vendors, partners, resources in advance of a compromise. We can help get these things in order for you. READ MORE |
Bug Bounties | Companies pay ‘white hat’ hackers to find vulnerabilities (bugs) in their system. The range in reward can be tens of thousands of dollars, a tee shirt, or a simple thank you. |
Business Credit Report | Like consumers and individuals, businesses have a credit report that establishes creditworthiness, payment history with trends, public filing and overall utilization for the business. |
Business Credit Score | A business’ payment history, credit history, recent credit usage, credit dings, and loans influence their Business Credit Score. |
BYOD | Bring Your Own Device, not Bottle. Use your cell phone, keep paying for that bill and the company will download the necessary software and apps for you to access their network/email/etc. |
Card Cloners | Card Cloners are placed on merchant credit card terminals that will read your magnetic strip, save it, which allows the hacker to buy things on your credit card until it gets shut down. |
Carding | Until the bouncer, or in this case you, your bank or credit card provider senses the picture doesn’t quite match the user, hackers will buying things with the credit card information they stole from you. |
Catfishing | I have great recipe for Southern Fried, Lightly Dusted with Blackened Seasoning, Catfish. Click Here For Recipe > |
Cookie | The new norm for people browsing the internet and visiting someones site for the first time requires us to ‘accept’ or ‘decline’ their Cookies Policy. Imagine inviting your neighbors over for a dinner party, and as they are walking through your front door you have a sign that says: “By continuing through this doorway, you acknowledge the use of cookies.” Basically telling your neighbors that you will be watching them during this wonderful gathering so you can better understand them and use that information to make your newly formed relationship be continually drawn back to your house based upon your visits. If you happened to notice that one of your neighbors admired a rare bottle of bourbon on your stocked booze shelf, they would be leaving a morsel of ‘cookie’ next to that bottle for you to remember that they just might be interesting in coming back for a nip? |
Cryptojacking | This isn’t a gold-mine, but hackers will secretly use your device to mine cryptocurrency. Hi ho, hi ho, it’s off to work your computer goes. |
Cyber Insurance | In business? You should ask your broker more about it. Oh, and tell them you are creating awareness, changing the behavior of your employees, because you’ve embraced a culture of security. |
Cyber Tick | You guessed it, made it up right here and now. |
Cyber Underdog | Coming to the rescue very soon. |
Cyber Wellness Check | It’s time, click HERE |
Cybersecurity Resources Road Map | Homeland Security Map FOUND HERE |
DarkWeb | Bad place. |
Data Repair Costs | This not the type of ‘bill’ or ‘invoice’ or ‘proposal’ that any company executive would like to see come across their desk. |
Digital Underground | Essentially the place within the internet commonly referred to as the DarkWeb. |
DoS Denial of Service | Basically it is a focused attack on a computer or terminal where a hacker makes it unavailable by flooding it with traffic to make it crash. |
Employee Benefits Broker | See Benefit Broker above. |
Enrollment Technology Company | A company that specializes in providing a platform for employees to select and elect their benefit plans. |
Gamification | The way Cyber Security training and awareness should be presented. |
Gamify | We should Gamify Cyber Security training and awareness. |
Hacker | Bad people. |
Hacktivism | Hacktivism refers to politically or socially motivated hacking. A hacker wants to get their point across by disrupting governments or companies of all sizes and shapes. ‘I will show them’ is what the hacker is saying by disrupting their services, shutting down infrastructure, placing a message on their site, just to get a point across. |
Human Firewall | That’s us, we need to recognize when things just don’t seem right in our day-to-day lives within the workplace and at home. Hackers rely on us to be humans, focusing on our behaviors to gain access into areas that can produce financial gain for themselves. It all starts with the ABC’s of cyber security. On-going Phishing simulations just might be the best way to keep your employees on their toes when it comes to be on the front line, fighting against the hackers trying to get in. So let’s R.E.S.T. and go phishing! |
IC3 | The FBI’s Internet Crime Complaint Center |
IDTP | Acronym for Identity Theft Protection |
Information Security | Not spoken in a common language. |
IoT | Acronym for Internet of Things |
IRP – Incident Reponse Planning | Acronym for Incident Response Planning |
Keylogging | Think of an old-fashioned type writer. Keylogging goes back before computers were even invented. In today’s world, a hacker has the ability to record (unknowingly to you) every keystroke you type on the keyboard in an attempt to capture user names, passwords and account numbers for things like credit cards, bank accounts, investment accounts, retirement accounts, really anywhere they can find money. |
Malware | Malware turns off the lights, shuts things down, stops you from doing what you want to do. The hacker would be happy to turn things back on, you just need to buy some Bitcoin and follow their instructions on where to send the Bitcoin. Keep your fingers crossed that the hacker will do as they promised on their end. |
P&C Broker | Property & Casualty Broker |
P7 | Abbreviation for: Proper Prior Planning Prevents Piss Poor Performance |
Pedagogical Approach | Refers to the theory and practice of learning and how this approach influences, and is influenced by, the social, political and psychological development of learners(employees). |
Peer-to-Peer | Remember the days of Napster, sharing music between people around the world, well that’s where things got really interesting. The Peer-to-Peer music sharing was acutally file sharing, because music is essentially a file from the computers perspective. We were basically inviting everyone to access our files by accepting the original T&C’s of these types of programs. |
PenTest | Abbreviation for Penetration Testing. |
PEO | Acronym for Professional Employer Organization |
Phishing | It’s not following a certain hippie band, nor is it heading down to the lake to catch a trout. Phishing relates to a type of email scam designed to deceive recipients into sharing sensitive information with a hacker. Phishing emails often appear to come from a reputable source such as a bank, social media channel, internal department, or another business with whom you have an account, like a retailer, online game, or online music service. READ MORE |
PII | Acronym for Personal Identifiable Information. i.e., first name, last name and many combinations |
Podcast | Check it out, COMING SOON. |
Ransomware | The Malware did its job by shutting you down, it’s now time to set up a Bitcoin purchase account so you can pay off the hacker’s ransom. |
Reputation Risk | How much are you willing to risk to maintain your reputation? Better yet, make security part of your story when selling your company’s services to potential clients. We can help you do that! |
R.E.S.T. Test | Acronym used to help remind all of us when seeing an email from an unknown sender, or any ‘suspicious’ email. Are they: Requesting private information from you or asking you to do something out of norm? Emotions…are they possibly playing with your emotions? Spelling and grammar…many phishing emails contain incorrect spelling and/or poor grammar. Think before you click. |
ROIT | Acronym for Return on Invested Time |
Runways | What children are referred to on the DarkWeb because their identities have such great opportunities for them to explore once they take off. |
Security Awareness Training | Is now being referred to a the ABC’s,. |
Security Framework | A tool for setting up what your overall plan will look like. |
SMB | Acronym for Small Mid-sized Business |
SMB Monitoring | Small Business Monitoring – Monitors the DarkWeb for exposed business assets and credentials like Domains and URL’s. Allows small business owners to see their credit standing and to help businesses protect their identity and reputation. |
Social Engineering | This might be where the rubber meets the road. 95% of successful cyber attacks are a result a phishing scam – a top social engineering technique. |
Spearphishing | Spearphishing takes patience, focus and timing. Hacker’s will test the behaviors of employees through email communication, in hopes they will click on the bait. |
Spoofing | Spoofing involves a hacker using a company URL/Domain that you trust (@yourfavoritecompany.com), for you to then click on so it can place malware on your system or have you click out of the email onto a landing page that you’re familiar with to fill out a form with PII. |
TPA | Acronym for Third Party Administrator |
vCISO | Virtual Chief Information Security Officer. Learn about our Enterprise vCISO offering HERE |
Virus | Consider the virus as a harmful little ‘software’ that will attach itself to active host programs and applications on your internet connected device, then replicate itself which slows down your system. A cyber wellness check just might be in order if you think your devices are not running the way they should? |
Voluntary Benefits | Typically offered to employees through their employer at the time of open enrollment or benefit election and paid for by the employee via payroll deduction. Examples of voluntary benefits include group life insurance, dental, vision, long-term disability, critical illness, identity protection, etc. |
Voluntary Specialist | A benefits broker that specializes in providing Voluntary Benefits to a company and their employees. |
VPN | Acronym for Virtual Private Network. |
Watering Hole Attack | A Watering Hole is a place employees might frequent on their way home from a long days work. A hacker will find websites that employees of a specific company like to visit frequently (a watering hole), then place a bug in that website/watering hole for the visiting employee to then pick-up the virus and bring it into their system, the actual target of the hacker. It’s like a Cyber Tick, jumping on, then jumping off. |
Whaling | Whaling is not taking a cruise to see the whales crest the ocean’s surface. If your title starts with a C (CEO, CFO, CIO, etc), you’re the target of a hackers whaling expedition. They want to use your email as a way to get others inside your company to do bad things like transfer money to an account, or pay an invoice that you approved, but in reality it wasn’t you. |
Worksite Marketing | Original term for Voluntary Benefits, they were offered to employees in the worksite environment, typcially in person, through a broker offering solutions and services sponsored by the employer. |
Worm | Worms are independent, they don’t require any human intervention to spread and infect your network because they are able to self-replicate from machine-to-machine across a network, then they just clog everything up. If you want to go fishing, dig up the worms. If you want to test your employees against Phishing, CLICK HERE. |
Zero-Day | Hackers are very patient, and the day they release the virus, is the day the ‘vendor’ or compromised party starts counting (zero-day) to fix and patch the problem. Time is a clicking… |
Zombie | You are a Zombie if a hacker takes control of an internet connected device of yours, brings you into their Botnet, and then spreads email spam, launches DoS attacks to all of your contacts. We’ve all been a Zombie, the problem is, you probably still are and don’t even know it! |
Our SecureABC team is available to answer your questions and identify the best path toward cyber security within your organization.