CINXE.COM
25 Security Terms You Should Know - Spiceworks
<!DOCTYPE html> <html lang="en-US" > <head> <!-- Data Layer Code starts --> <!-- Data Layer Code ends --> <!-- Google Tag Manager --> <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-PGLF8G');</script> <!-- End Google Tag Manager --> <!-- NEW Google Tag Manager --> <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-KTKRL68F');</script> <!-- NEW End Google Tag Manager --> <!--<script async src="https://ajax.googleapis.com/ajax/libs/jquery/3.4.1/jquery.min.js"></script> <script async src="/wp-includes/js/jquery/jquery.min.js?ver=3.6.0"></script>--> <!--<script src="/wp-content/themes/gauge-child/lib/scripts/custom.js"></script>--> <script src="https://cdn.jsdelivr.net/npm/js-cookie@3.0.1/dist/js.cookie.min.js" async="true"></script> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link href="https://fonts.googleapis.com/css2?family=Roboto:ital,wght@0,300;0,400;0,500;0,700;1,300;1,400;1,500;1,700&display=swap" rel="stylesheet"> <link rel="profile" href="https://gmpg.org/xfn/11" /> <link rel="icon" href="/wp-content/themes/gauge-child/images/favicon.ico" type="image/x-icon"> <!-- zdconsent.js & z0WVjCBSEeGLoxIxOQVEwQ.min.js for EU user popup --> <!-- editorial page script starts --> <script src="//mail.spiceworks.com/resources/sharing/popoverv2.js?sharing=lp-popover&domain=mail.spiceworks.com&id=78Z3-8YH%2Ftech-news-insights%22&delay=5&mobile=&keydismiss=&width=650&description="></script> <!-- editorial page script ends --> <!-- CHD Landing Pages start --> <style> .popular-section{display:none;} </style> <!-- CHD Landing Pages end --> <meta name='robots' content='index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1' /> <!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.5) - https://yoast.com/wordpress/plugins/seo/ --> <title>25 Security Terms You Should Know - Spiceworks</title> <meta name="keywords" content="security terms" /> <meta name="description" content="You'll hear these security terms a lot during Cybersecurity Awareness Month. Do you know what APT, DLP, or IAM mean?" /> <link rel="canonical" href="https://www.spiceworks.com/it-security/security-general/articles/important-cybersecurity-terms/" /> <meta property="og:locale" content="en_US" /> <meta property="og:type" content="article" /> <meta property="og:title" content="25 Security Terms You Should Know - Spiceworks" /> <meta property="og:description" content="You'll hear these security terms a lot during Cybersecurity Awareness Month. Do you know what APT, DLP, or IAM mean?" /> <meta property="og:url" content="https://www.spiceworks.com/it-security/security-general/articles/important-cybersecurity-terms/" /> <meta property="og:site_name" content="Spiceworks Inc" /> <meta property="article:publisher" content="https://www.facebook.com/SpiceworksNews/" /> <meta property="article:modified_time" content="2024-10-02T20:16:22+00:00" /> <meta property="og:image" content="https://images.spiceworks.com/wp-content/uploads/2021/10/04053151/shutterstock_1817476859.jpg" /> <meta property="og:image:width" content="620" /> <meta property="og:image:height" content="310" /> <meta property="og:image:type" content="image/jpeg" /> <meta name="twitter:card" content="summary_large_image" /> <meta name="twitter:site" content="@SpiceworksNews" /> <meta name="twitter:label1" content="Est. reading time" /> <meta name="twitter:data1" content="14 minutes" /> <!-- / Yoast SEO Premium plugin. --> <link rel='dns-prefetch' href='//www.google.com' /> <link rel='dns-prefetch' href='//edge.spiceworksstatic.com' /> <link rel='dns-prefetch' href='//fonts.googleapis.com' /> <link rel='preconnect' href='https://fonts.gstatic.com' crossorigin /> <script type="text/javascript"> /* <![CDATA[ */ window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/www.spiceworks.com\/wp-includes\/js\/wp-emoji-release.min.js?ver=6.6.2"}}; /*! This file is auto-generated */ !function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);var t=new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return e===r[t]})}function u(e,t,n){switch(t){case"flag":return n(e,"\ud83c\udff3\ufe0f\u200d\u26a7\ufe0f","\ud83c\udff3\ufe0f\u200b\u26a7\ufe0f")?!1:!n(e,"\ud83c\uddfa\ud83c\uddf3","\ud83c\uddfa\u200b\ud83c\uddf3")&&!n(e,"\ud83c\udff4\udb40\udc67\udb40\udc62\udb40\udc65\udb40\udc6e\udb40\udc67\udb40\udc7f","\ud83c\udff4\u200b\udb40\udc67\u200b\udb40\udc62\u200b\udb40\udc65\u200b\udb40\udc6e\u200b\udb40\udc67\u200b\udb40\udc7f");case"emoji":return!n(e,"\ud83d\udc26\u200d\u2b1b","\ud83d\udc26\u200b\u2b1b")}return!1}function f(e,t,n){var r="undefined"!=typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement("canvas"),a=r.getContext("2d",{willReadFrequently:!0}),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupports",s=["flag","emoji"],n.supports={everything:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionStorage.getItem(o));if("object"==typeof e&&"number"==typeof e.timestamp&&(new Date).valueOf()<e.timestamp+604800&&"object"==typeof e.supportTests)return e.supportTests}catch(e){}return null}();if(!n){if("undefined"!=typeof Worker&&"undefined"!=typeof OffscreenCanvas&&"undefined"!=typeof URL&&URL.createObjectURL&&"undefined"!=typeof Blob)try{var e="postMessage("+f.toString()+"("+[JSON.stringify(s),u.toString(),p.toString()].join(",")+"));",r=new Blob([e],{type:"text/javascript"}),a=new Worker(URL.createObjectURL(r),{name:"wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.everything&&n.supports[t],"flag"!==t&&(n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings); /* ]]> */ </script> <link rel='stylesheet' id='ids_navigation_css-css' href='https://edge.spiceworksstatic.com/service.identity/assets/navigation.css?defer&ver=v3.2.4' type='text/css' media='all' /> <style id='wp-emoji-styles-inline-css' type='text/css'> img.wp-smiley, img.emoji { display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important; margin: 0 0.07em !important; vertical-align: -0.1em !important; background: none !important; padding: 0 !important; } </style> <style id='classic-theme-styles-inline-css' type='text/css'> /*! This file is auto-generated */ .wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none} </style> <style id='global-styles-inline-css' type='text/css'> :root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio--3-4: 3/4;--wp--preset--aspect-ratio--3-2: 3/2;--wp--preset--aspect-ratio--2-3: 2/3;--wp--preset--aspect-ratio--16-9: 16/9;--wp--preset--aspect-ratio--9-16: 9/16;--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #ffffff;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display: grid;}.is-layout-grid > :is(*, div){margin: 0;}:where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;}:where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;} :where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;} :where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;} :root :where(.wp-block-pullquote){font-size: 1.5em;line-height: 1.6;} </style> <link rel='stylesheet' id='gp-parent-style-css' href='https://www.spiceworks.com/wp-content/themes/gauge/style.css?defer&ver=v3.2.4' type='text/css' media='all' /> <link rel='stylesheet' id='ghostpool-style-css' href='https://www.spiceworks.com/wp-content/themes/gauge-child/style.css?ver=v3.2.4' type='text/css' media='all' /> <style id='ghostpool-style-inline-css' type='text/css'> #gp-main-header{height: 125px;} #gp-fixed-header-padding{padding-top: 125px;} #gp-logo img{width: 220px; height: 69px;} .gp-page-header .gp-container{padding-top: 155px;padding-bottom: 50px;} .gp-active{color: ;} .gp-score-spinner{ background: #E63900; background: -moz-linear-gradient(#E63900 0%,#E6730070%); background: -webkit-gradient(color-stop(0%,#E63900 ), color-stop(70%,#E67300 )); background: -webkit-linear-gradient(#E63900 0%,#E67300 70%); background: -o-linear-gradient(#E63900 0%,#E67300 70%); background: -ms-linear-gradient(#E63900 0%,#E67300 70%); background: linear-gradient(#E63900 0%,#E67300 70%); filter: progid:DXImageTransform.Microsoft.gradient( startColorstr="#E67300", endColorstr="#E63900",GradientType=1 ); } .gp-no-score-clip-1 .gp-score-spinner{ background: #E63900; } .gp-no-score-clip-2 .gp-score-filler{ background: #E63900; background: -moz-linear-gradient(#E67300 0%,#E6390070%); background: -webkit-gradient(color-stop(0%,#E67300 ), color-stop(70%,#E63900 )); background: -webkit-linear-gradient(#E67300 0%,#E63900 70%); background: -o-linear-gradient(#E67300 0%,#E63900 70%); background: -ms-linear-gradient(#E67300 0%,#E63900 70%); background: linear-gradient(#E67300 0%,#E63900 70%); filter: progid:DXImageTransform.Microsoft.gradient( startColorstr="#E63900", endColorstr="#E67300",GradientType=1 ); } select{background-color: #fff;} .gp-responsive #gp-sidebar{border-color: #ddd;} .gp-slider .gp-slide-image { height: 450px; }.gp-theme #buddypress .activity-list .activity-content blockquote a{color: }.gp-theme #buddypress .activity-list .activity-content blockquote a:hover{color: }.gp-wide-layout.gp-header-standard .gp-nav .menu li.megamenu > .sub-menu, .gp-wide-layout.gp-header-standard .gp-nav .menu li.tab-content-menu .sub-menu, .gp-wide-layout.gp-header-standard .gp-nav .menu li.content-menu .sub-menu{left: -220px;}.gp-scrolling.gp-wide-layout.gp-header-standard .gp-nav .menu li.megamenu > .sub-menu, .gp-scrolling.gp-wide-layout.gp-header-standard .gp-nav .menu li.tab-content-menu .sub-menu, .gp-scrolling.gp-wide-layout.gp-header-standard .gp-nav .menu li.content-menu .sub-menu{left: -220px;}.gp-boxed-layout.gp-header-standard .gp-nav .menu li.megamenu > .sub-menu, .gp-boxed-layout.gp-header-standard .gp-nav .menu li.tab-content-menu .sub-menu, .gp-boxed-layout.gp-header-standard .gp-nav .menu li.content-menu .sub-menu{left: -220px;}.gp-scrolling.gp-boxed-layout.gp-header-standard .gp-nav .menu li.megamenu > .sub-menu, .gp-scrolling.gp-boxed-layout.gp-header-standard .gp-nav .menu li.tab-content-menu .sub-menu, .gp-scrolling.gp-boxed-layout.gp-header-standard .gp-nav .menu li.content-menu .sub-menu{left: -146.666666667px;}@media only screen and (max-width: 1023px) { .gp-responsive #gp-main-header {height: 83px!important;} .gp-responsive #gp-fixed-header-padding {padding-top: 83px!important;} .gp-responsive #gp-logo {margin: 0px 0px 0px 0px; width: 147px; height: 46px;} .gp-responsive #gp-logo img {width: 147px; height: 46px;} .gp-responsive .gp-page-header .gp-container { padding-top: 103px; padding-bottom: 33px; } } @media only screen and (max-width: 767px) { .gp-responsive .gp-slider .gp-slide-image { height: 200px !important; } } @media only screen and (max-width: 320px) { .gp-responsive.gp-theme .woocommerce div.product .woocommerce-tabs ul.tabs li.active a,.gp-responsive.gp-theme .woocommerce #gp-content div.product .woocommerce-tabs ul.tabs li.active a,.gp-responsive.gp-theme.woocommerce-page div.product .woocommerce-tabs ul.tabs li.active a,.gp-responsive.gp-theme.woocommerce-page #gp-content div.product .woocommerce-tabs ul.tabs li.active a {border-color: #ddd;}} hr,.gp-theme .woocommerce .widget_price_filter .price_slider_wrapper .ui-widget-content,.gp-theme.woocommerce-page .widget_price_filter .price_slider_wrapper .ui-widget-content {background: #ddd; }@media only screen and (min-width: 1201px) {.gp-container,.gp-fullwidth .vc_col-sm-12.wpb_column > .wpb_wrapper > .wpb_row,.gp-fullwidth .vc_col-sm-12.wpb_column > .wpb_wrapper > .wpb_accordion,.gp-fullwidth .vc_col-sm-12.wpb_column > .wpb_wrapper > .wpb_tabs,.gp-fullwidth .vc_col-sm-12.wpb_column > .wpb_wrapper > .wpb_tour,.gp-fullwidth .vc_col-sm-12.wpb_column > .wpb_wrapper > .wpb_teaser_grid,.gp-slide-caption,.gp-nav .menu li.megamenu > .sub-menu,.gp-nav .menu li.tab-content-menu .sub-menu,.gp-nav .menu li.content-menu .sub-menu{width: 1170px;} .gp-slide-caption{margin-left: -585px;}#gp-content,.gp-top-sidebar #gp-review-content{width: 810px;}#gp-sidebar{width: 330px;}}@media only screen and (max-width: 1200px) and (min-width: 1083px) {.gp-responsive .gp-container,.gp-responsive.gp-fullwidth .vc_col-sm-12.wpb_column > .wpb_wrapper > .wpb_row,.gp-responsive.gp-fullwidth .vc_col-sm-12.wpb_column > .wpb_wrapper > .wpb_accordion,.gp-responsive.gp-fullwidth .vc_col-sm-12.wpb_column > .wpb_wrapper > .wpb_tabs,.gp-responsive.gp-fullwidth .vc_col-sm-12.wpb_column > .wpb_wrapper > .wpb_tour,.gp-responsive.gp-fullwidth .vc_col-sm-12.wpb_column > .wpb_wrapper > .wpb_teaser_grid,.gp-responsive .gp-slide-caption,.gp-nav .menu li.megamenu > .sub-menu,.gp-nav .menu li.tab-content-menu .sub-menu,.gp-nav .menu li.content-menu .sub-menu{width: 1040px;} .gp-responsive .gp-slide-caption{margin-left: -520px;}.gp-responsive #gp-content,.gp-responsive .gp-top-sidebar #gp-review-content{width: 680px;}.gp-responsive #gp-sidebar,.gp-responsive.gp-no-sidebar #gp-user-rating-wrapper,.gp-responsive.gp-fullwidth #gp-user-rating-wrapper{width: 330px;}}@media only screen and (max-width: 1082px) and (min-width: 1024px) {.gp-responsive .gp-container,.gp-responsive.gp-fullwidth .vc_col-sm-12.wpb_column > .wpb_wrapper > .wpb_row,.gp-responsive.gp-fullwidth .vc_col-sm-12.wpb_column > .wpb_wrapper > .wpb_accordion,.gp-responsive.gp-fullwidth .vc_col-sm-12.wpb_column > .wpb_wrapper > .wpb_tabs,.gp-responsive.gp-fullwidth .vc_col-sm-12.wpb_column > .wpb_wrapper > .wpb_tour,.gp-responsive.gp-fullwidth .vc_col-sm-12.wpb_column > .wpb_wrapper > .wpb_teaser_grid,.gp-responsive .gp-slide-caption,.gp-nav .menu li.megamenu > .sub-menu,.gp-nav .menu li.tab-content-menu .sub-menu,.gp-nav .menu li.content-menu .sub-menu{width: 980px;} .gp-responsive .gp-slide-caption{margin-left: -490px;} .gp-responsive .hub-header-info{width:490px;}.gp-responsive #gp-content,.gp-responsive .gp-top-sidebar #gp-review-content{width: 630px;}.gp-responsive #gp-sidebar {width: 330px;}}@import url('https://fonts.googleapis.com/css2?family=PT+Serif:ital,wght@0,400;0,700;1,400;1,700&display=swap'); .up-arrow i {display:none} .Addsticky .gp-container {padding-top: 0px} @media screen and (max-device-width: 767px) and (min-device-width: 320px){ .gp-page-header .gp-container {padding-top: 20px} } @media screen and (max-width:1280px) and (min-width:1025px) { .home-page-top-right .promo-img-mobile, .home-page-top-right .promo-img-ipad {display: none;} .gp-entry-text > .home-page-top-right {padding-bottom: 12px !important;} .gp-entry-text > .home-page-top-right ~ .home-page-top-right {padding: 18px 0px 15px 0px !important;} .gp-entry-text .home-page-top-left {width:55% !important;} .home-page-top-left .homepage-first-content {width:100% !important;} .gp-entry-text > .home-page-top-right ~ .home-page-top-right, .gp-entry-text > .home-page-top-right {width:38% !important;} .gp-entry-text > .home-page-top-right .nopadding.col-lg-4 {padding-right:18px !important;} .homepage-right-headline a {font-size: 16px !important;line-height: 23px !important;} } .homepage-popular-pad ul li:hover {background: #007FA2!important;border-radius: 3px!important;padding: 4px 8px!important;} .homepage-popular-pad ul li:hover a {color:#ffffff !important;} .article-description .gp-author-name a:hover, .article-description .gp-author-name a:focus {color: #007FA2 !important;} img[src*="https://zdbb.net/l/z0WVjCBSEeGLoxIxOQVEwQ?additionalInformation=&cms_page_id=&local_uid=myasuhsarv1w&referrer=&zd_pageview_id=0a531571-825f-4c41-94b5-313b860d5bc0&zd_session_id=ef296df0-303e-4408-bafa-cd73a16169df&zd_location=https%3A%2F%2Fcosmos-stage.spiceworks.com%2Ffree-help-desk-software%2Fself-hosted%2F&evidon_consent=undefined&third_party_consent=&fu=false&fpid=420c64da4dde461c93d30633c1acdaee&ppid=420c64da4dde461c93d30633c1acdaee"] {display:none;} @media screen and (min-width:1140px) and (max-width:3000px) { .article-sidebar .adcode-sidebar-two .right-section-1 {margin-top:35px !important;} .adcode-sidebar-two div#sidebar-bottom-ad {min-height: 251px;} } body.page-template-about-editorial-team .about-editorial-main .external-link-icon em.fas {display: none;} .gp-entry-content ol li {list-style: decimal;} .gp-entry-content ol li ol li {} .article-description h3 a{font-size: 36px!important;line-height: 46px!important;font-family:'Roboto'!important;font-style: normal!important;font-weight: 700!important;color: #007FA2!important;} .article-description h3 span{font-weight: 700!important;} .article-description h2 span{font-weight: 700!important;} #description img {margin-left: auto!important} b, strong { font-weight: 700; line-height: inherit;} .bg-orange-tint-4 span.external-link-icon em:before, .contact-main em.fas.fa-external-link-alt:before { display: none !important; } @media screen and (max-width:767px) and (min-width:100px) { body.postid-3146001 .article-description .gp-entry-text p {line-height: 27px !important;} body.postid-3146001 .gp-entry-text img {max-width: 100%;display: block;} } body.privacy-policy table th, body.privacy-policy .wp-block-table th, body.privacy-policy table td, body.privacy-policy .wp-block-table td {border: 1px solid #eee;padding: 15px;} .partnership-with-logo figure.article-thumbnail {margin: 0;} ol.serial-number li {list-style: unset;padding:6px 0;} ol.serial-number {margin: 0;padding: 0 0 0 25px;} body.privacy-policy .entry-content ul {list-style: none;margin: 0 0 0 17px;padding: 0;} body.privacy-policy .entry-content ul li {list-style: square;padding:6px 0;} @media only screen and (max-width: 1000px) { .lean-navbar-header__drawer-trigger--loading { max-width: 26px !important; } } body.author .f-right em.fa.fa-linkedin::before, body.archive .f-right em.fa.fa-linkedin::before { content: "\f0e1" !important; font-family: 'FontAwesome' !important; font-weight: normal !important; } .article-description table span.external-link-icon {font-size: 0px !important;} .take-me-to-community span.external-link-icon, body.single span.external-link-icon {font-size: 0;} </style> <link rel='stylesheet' id='redux-extendify-styles-css' href='https://www.spiceworks.com/wp-content/themes/gauge/lib/framework/redux/assets/css/extendify-utilities.css?ver=v3.2.4' type='text/css' media='all' /> <link rel='stylesheet' id='lightgallery-css-css' href='https://www.spiceworks.com/wp-content/themes/gauge-child/css/lightgallery.css?ver=v3.2.4' type='text/css' media='all' /> <script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/3.4.1/jquery.min.js?ver=3.4.1" id="jquery-core-js"></script> <script type="text/javascript" src="https://www.spiceworks.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1" id="jquery-migrate-js"></script> <script type="text/javascript" src="https://www.spiceworks.com/wp-content/themes/gauge-child/js/lightgallery.js?ver=1.6.16" id="lightgallery-js"></script> <script></script><link rel="https://api.w.org/" href="https://www.spiceworks.com/wp-json/" /><link rel='shortlink' href='https://www.spiceworks.com/?p=3138658' /> <link rel="alternate" title="oEmbed (JSON)" type="application/json+oembed" href="https://www.spiceworks.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.spiceworks.com%2Fit-security%2Fsecurity-general%2Farticles%2Fimportant-cybersecurity-terms%2F" /> <link rel="alternate" title="oEmbed (XML)" type="text/xml+oembed" href="https://www.spiceworks.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.spiceworks.com%2Fit-security%2Fsecurity-general%2Farticles%2Fimportant-cybersecurity-terms%2F&format=xml" /> <script> (function(h,o,t,j,a,r){ h.hj=h.hj||function(){(h.hj.q=h.hj.q||[]).push(arguments)}; h._hjSettings={hjid:2670087,hjsv:5}; a=o.getElementsByTagName('head')[0]; r=o.createElement('script');r.async=1; r.src=t+h._hjSettings.hjid+j+h._hjSettings.hjsv; a.appendChild(r); })(window,document,'//static.hotjar.com/c/hotjar-','.js?sv='); </script> <!--PogoConfig--> <script> window.PogoConfig = { 'template': 'articles', 'category': 'it-security', 'isNewsAndInsight': true, 'isLoggedIn': false, 'tags': ["cybersecurity","malware","phishing","ransomware","security-general"] } </script> <!--PogoConfig--> <script> const tax_data = { primary_category: 'security-general', secondary_category: '', tags: ["cybersecurity","malware","phishing","ransomware"] }; window.SWZDTaxonomyInfo = tax_data; </script> <meta name="generator" content="Redux 4.4.11" /><script>$(document).ready(function() { $("a[href='#']").attr('href', 'javascript:void(0)'); setTimeout(function(){ $('.gp-mobile-dropdown-icon').first().click(); $('.gp-mobile-dropdown-icon').first().addClass("menu-icon");}, 2000); setTimeout(function(){ $(".ArticleMain-lead img").attr('src').replace("-150x150",""); $("img").each(function(){ $(this).attr('src', $(this).attr("src").replace('-150x150', '')); $('#gp-copyright-text').html($('#gp-copyright-text').html().replace('2020','2021')); }); }, 1000); $('#gp-copyright-text').html($('#gp-copyright-text').html().replace('2020','2021')); //$('.single .gp-entry-text ul li a[target="_blank"]').removeAttr('target'); //$('.single .gp-entry-text p a[target="_blank"]').removeAttr('target'); if(window.location.href === "https://www.spiceworks.com/tech/sap/"){ $("#gp-page-wrapper #gp-top-header").next().next().next().next().addClass("hideme1"); }else if(window.location.href === "https://www.spiceworks.com/tech/peoplesoft/"){ $("#gp-page-wrapper #gp-top-header").next().next().next().next().addClass("hideme1"); }else if(window.location.href === "https://www.spiceworks.com/tech/siebel/"){ $("#gp-page-wrapper #gp-top-header").next().next().next().next().addClass("hideme1"); } var urlPath = window.location.pathname.split("/"); if(urlPath[1].match(/openidcallback/)) { console.log("printtt"); setTimeout(function(){ location.reload(); }, 3000); } }); jQuery(document).ready(function() { jQuery('.gp-standard-header.Addsticky').attr('style', 'top:0px'); }); jQuery(document).ready(function() { var stylesheet = $("<link>", { rel: "stylesheet", type: "text/css", href: "https://fonts.googleapis.com/css2?family=PT+Serif:ital,wght@0,400;0,700;1,400;1,700&display=swap" }); stylesheet.appendTo("head"); });</script><style type="text/css">.recentcomments a{display:inline !important;padding:0 !important;margin:0 !important;}</style><meta name="generator" content="Powered by WPBakery Page Builder - drag and drop page builder for WordPress."/> <link rel="icon" href="https://images.spiceworks.com/wp-content/uploads/2024/07/02084556/spiceworks-logo-icon.jpg" sizes="32x32" /> <link rel="icon" href="https://images.spiceworks.com/wp-content/uploads/2024/07/02084556/spiceworks-logo-icon.jpg" sizes="192x192" /> <link rel="apple-touch-icon" href="https://images.spiceworks.com/wp-content/uploads/2024/07/02084556/spiceworks-logo-icon.jpg" /> <meta name="msapplication-TileImage" content="https://images.spiceworks.com/wp-content/uploads/2024/07/02084556/spiceworks-logo-icon.jpg" /> <style>.shorten_url { padding: 10px 10px 10px 10px ; border: 1px solid #AAAAAA ; background-color: #EEEEEE ; }</style><style id="gp-dynamic-css" title="dynamic-css" class="redux-options-output">#gp-logo{margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}#gp-page-wrapper,.gp-post-section-header h3,#reply-title{background-color:#fff;}body{line-height:24px;color:#0d0d0d;font-size:14px;}.gp-entry-header .gp-entry-meta,#gp-review-content-wrapper .gp-subtitle,.gp-post-section-header-line,.gp-element-title-line,#comments ol.commentlist li .comment_container,.gp-portfolio-filters,.gp-tablet-portrait #gp-sidebar,.gp-mobile #gp-sidebar,#gp-review-summary,.gp-login-content,.gp-loop-divider:before, section.sticky{border-top:1px solid #eee;border-bottom:1px solid #eee;}.gp-slide-caption-title,.gp-featured-caption-title{color:#ffffff;}.gp-slide-caption-text,.gp-featured-caption-text{color:#ffffff;}#gp-top-header{background-color:#000;}#gp-top-header{border-bottom:1px solid #292929;}#gp-left-top-nav .menu > li,#gp-left-top-nav .menu > li > a{font-family:"Open Sans",Arial, Helvetica, sans-serif;font-weight:400;font-style:normal;color:#fff;font-size:12px;}#gp-left-top-nav .menu > li > a:not(.gp-notification-counter){color:#fff;}#gp-left-top-nav .menu > li > a:not(.gp-notification-counter):hover{color:#f84103;}#gp-top-header .gp-social-icons a{font-size:14px;}#gp-top-header .gp-social-icons a{color:#555555;}#gp-top-header .gp-social-icons a:hover{color:#eeeeee;}#gp-top-header #gp-cart-button{color:#fff;}#gp-top-header #gp-cart-button:hover{color:#f84103;}#gp-right-top-nav .menu > li, #gp-right-top-nav .menu > li a{font-family:"Open Sans";font-weight:400;font-style:normal;font-size:12px;}#gp-right-top-nav .menu > li > a:not(.gp-notification-counter){color:#f84103;}#gp-right-top-nav .menu > li > a:not(.gp-notification-counter):hover{color:#fff;}#gp-main-header{background-color:transparent;}.gp-desktop #gp-main-header.gp-header-small,.gp-desktop.gp-header-noresize #gp-main-header.header-large,.gp-no-large-title #gp-main-header{background-color:#1c1c1c;}#gp-main-nav .menu > li{font-family:"Open Sans";font-weight:400;font-style:normal;color:#fff;font-size:14px;}#gp-main-nav .menu > li > a{color:#fff;}#gp-main-nav .menu > li > a:hover{color:#f84103;}.gp-nav .sub-menu,.gp-nav .menu li .gp-menu-tabs li:hover, .gp-nav .menu li .gp-menu-tabs li.gp-selected{background-color:#f1f1f1;}.gp-nav .menu > li.menu-item-has-children > a:hover:after,.gp-nav .menu > li.menu-item-has-children:hover > a:after,.gp-nav .menu > li.tab-content-menu > a:hover:after,.gp-nav .menu > li.tab-content-menu:hover > a:after,.gp-nav .menu > li.content-menu > a:hover:after,.gp-nav .menu > li.content-menu:hover > a:after,#gp-dropdowncart .menu > li:hover a:after{color:#f1f1f1;}.gp-nav .sub-menu li a:hover{background-color:#f1f1f1;}.gp-nav .sub-menu li,#gp-dropdowncart .total,#gp-dropdowncart .buttons{border-top:1px solid #dddddd;}.gp-nav .sub-menu li,.gp-nav .sub-menu a{font-family:"Open Sans";font-weight:400;font-style:normal;color:#000;font-size:14px;}.gp-nav .sub-menu li a{color:#000;}.gp-nav .sub-menu li a:hover{color:#f84103;}.gp-nav .megamenu > .sub-menu > li > a{color:#f84103;}.gp-nav .megamenu > .sub-menu > li{border-left:1px solid #dddddd;}.gp-nav .gp-dropdown-icon{color:#f84103;}.gp-menu-tabs{background-color:#333;}.gp-nav .menu li .gp-menu-tabs li{color:#ffffff;}.gp-nav .menu li .gp-menu-tabs li:hover,.gp-nav .menu li .gp-menu-tabs li.gp-selected{color:#333333;}#gp-main-header .gp-search-bar{background-color:#eee;}#gp-main-header .gp-search-bar{border-top:1px solid #fff;border-bottom:1px solid #fff;border-left:1px solid #fff;border-right:1px solid #fff;}#gp-main-header .gp-search-bar{color:#000;font-size:12px;}#gp-main-header .gp-search-submit{background-color:transparent;}#gp-main-header .gp-search-submit:hover{background-color:transparent;}#gp-main-header .gp-search-submit{color:#f84103;font-size:12px;}#gp-main-header .gp-search-submit:hover{color:#f84103;}#gp-mobile-nav-button{color:#f84103;}#gp-mobile-nav{background-color:#000;}#gp-mobile-nav-close-button{background-color:#f84103;}#gp-mobile-nav li{color:#ffffff;}#gp-mobile-nav .menu > li > a{color:#f84103;}#gp-mobile-nav .menu > li > a:hover{color:#fff;}#gp-mobile-nav .sub-menu li a{color:#fff;}#gp-mobile-nav .sub-menu li a:hover{color:#f84103;}#gp-mobile-nav .megamenu > .sub-menu > li > a{color:#f84103;}#gp-mobile-nav li a:hover{background-color:#000;}#gp-mobile-nav li{border-top:1px solid #333333;}.gp-mobile-dropdown-icon{background-color:#1d1d1d;}li.gp-active > .gp-mobile-dropdown-icon{background-color:#333;}#gp-mobile-nav .gp-search-bar{background-color:#eee;}#gp-mobile-nav .gp-search-bar{border-top:1px solid #fff;border-bottom:1px solid #fff;border-left:1px solid #fff;border-right:1px solid #fff;}#gp-mobile-nav .gp-search-bar{color:#000;font-size:13px;}#gp-mobile-nav .gp-search-submit{background-color:transparent;}#gp-mobile-nav .gp-search-submit:hover{background-color:transparent;}#gp-mobile-nav .gp-search-submit{color:#f84103;font-size:13px;}#gp-mobile-nav .gp-search-submit:hover{color:#f84103;}.gp-page-header{background-color:#1c1c1c;background-repeat:no-repeat;background-attachment:scroll;background-position:center center;background-size:cover;}.gp-page-header .gp-entry-title,.gp-page-header .gp-entry-title a{line-height:52px;color:#fff;font-size:46px;}.gp-page-header .gp-subtitle{line-height:21px;color:#fff;font-size:15px;}.gp-page-header .gp-entry-title.gp-has-subtitle:after{border-top:1px solid #fff;}.gp-entry-title,.woocommerce .page-title,.woocommerce div.product .entry-title.product_title{line-height:48px;color:#000;font-size:36px;}.gp-subtitle{line-height:32px;color:#888;font-size:20px;}.gp-post-section-header h3,.woocommerce ul.products li.product h3,.woocommerce ul.products li.product .woocommerce-loop-product__title{color:#000000;}.gp-entry-meta,.gp-entry-meta a,.wp-caption-text,#gp-breadcrumbs,#gp-breadcrumbs a,.gp-theme.woocommerce-page .product_meta,.gp-theme.woocommerce-page .product_meta a{color:#B3B3B1;}.gp-entry-tags,.gp-entry-tags a{color:#B3B3B1;}.gp-author-info{background-color:#f8f8f8;}.gp-author-info{color:#000000;}.gp-author-info{border-bottom:1px solid #eee;}blockquote{background-color:#f84103;}blockquote,blockquote a,blockquote a:hover{font-family:"Open Sans",Arial, Helvetica, sans-serif;line-height:26px;font-weight:400;font-style:normal;color:#fff;font-size:16px;}.gp-loop-title{font-family:Arvo;line-height:26px;font-weight:400;font-style:normal;font-size:18px;}.gp-blog-large .gp-loop-title{line-height:42px;font-size:30px;}.gp-loop-title a,.gp-edit-review-form button,.gp-delete-review-form button{color:#f84103;}.gp-loop-title a:hover,.gp-edit-review-form button:hover,.gp-delete-review-form button:hover{color:#000;}.gp-loop-meta,.gp-loop-meta a{color:#B3B3B1;}.gp-entry-cats a,.gp-loop-cats a{background-color:#000;}.gp-entry-cats a,.gp-entry-cats a:hover,.gp-loop-cats a,.gp-loop-cats a:hover{color:#ffffff;}.gp-loop-tags,.gp-loop-tags a{color:#B3B3B1;}.gp-blog-masonry section{background-color:#1c1c1c;}.gp-blog-masonry .gp-loop-title a{color:#f84103;}.gp-blog-masonry .gp-loop-title a:hover{color:#fff;}.gp-blog-masonry .gp-loop-content{color:#ffffff;}.blog-masonry .entry-meta,.blog-masonry .entry-meta a{color:#B3B3B1;}.gp-blog-masonry .gp-loop-tags,.gp-blog-masonry .gp-loop-tags a{color:#B3B3B1;}.gp-blog-masonry section:before,.gp-blog-masonry .gp-post-thumbnail:before{background-color:#1c1c1c;}.gp-blog-masonry section:before,.gp-blog-masonry .gp-post-thumbnail:before{color:#ffffff;}.gp-post-thumbnail .gp-loop-title{line-height:26px;font-size:16px;}.gp-post-thumbnail .gp-loop-title,.gp-ranking-wrapper .gp-loop-title a{color:#fff;}.gp-post-thumbnail .gp-loop-title:hover,.gp-ranking-wrapper .gp-loop-title a:hover{color:#fff;}.gp-hub-award{background-color:#f84103;}ul.page-numbers .page-numbers{background-color:#333333;}ul.page-numbers .page-numbers:hover,ul.page-numbers .page-numbers.current,ul.page-numbers > span.page-numbers{background-color:#F84103;}ul.page-numbers .page-numbers{color:#ffffff;}.gp-hub-header,.gp-hub-header a,.gp-hub-header .gp-entry-meta,.gp-hub-header .gp-entry-meta a{color:#ffffff;}#gp-affiliate-button{background-color:#00D6EC;}#gp-affiliate-button:hover{background-color:#F84103;}#gp-affiliate-button{color:#ffffff;}#gp-hub-tabs{background-color:#1c1c1c;}#gp-hub-tabs{border-top:2px solid #f84103;}#gp-hub-tabs li{border-bottom:1px solid #323232;border-left:1px solid #323232;border-right:1px solid #323232;}#gp-hub-tabs li a,#gp-hub-tabs-mobile-nav-button{font-family:"Open Sans",Arial, Helvetica, sans-serif;line-height:21px;font-weight:600;font-style:normal;color:#fff;font-size:13px;}#gp-hub-tabs li a:hover,#gp-hub-tabs li.current_page_item a{background-color:#f84103;}#gp-hub-details{background-color:#1c1c1c;}#gp-hub-details,#gp-hub-details a,#gp-hub-details .gp-entry-title{color:#ffffff;}.gp-hub-child-page #gp-content .gp-entry-title{line-height:38px;color:#000;font-size:26px;}#gp-review-content-wrapper.gp-review-first-letter .gp-entry-text > p:first-child::first-letter,#gp-review-content-wrapper.gp-review-first-letter .gp-entry-text > *:not(p):first-child + p::first-letter,#gp-review-content-wrapper.gp-review-first-letter .gp-entry-text .vc_row:first-child .vc_column_container:first-child .wpb_wrapper:first-child .wpb_text_column:first-child .wpb_wrapper:first-child > p:first-child::first-letter{font-family:Arvo,Arial, Helvetica, sans-serif;line-height:100px;font-weight:400;font-style:normal;color:#F84102;font-size:100px;}#gp-review-summary{background-color:#1c1c1c;}#gp-review-summary{color:#ffffff;}#gp-points-wrapper .gp-good-points li i{color:#f84103;}#gp-points-wrapper .gp-bad-points li i{color:#5fa2a5;}#gp-review-summary .gp-rating-text,#gp-featured-wrapper .gp-rating-text,.gp-hub-header .gp-rating-text,#gp-homepage-slider .gp-rating-text,.gp-featured-wrapper .gp-rating-text,.gp-ranking-wrapper .gp-rating-text{color:#ffffff;}section .gp-rating-text{color:#000000;}.gp-your-rating,.gp-user-reviews-link:hover{color:#f84103;}section .gp-average-rating{background-color:#f84103;}.gp-rating-gauge .gp-site-rating-selection,.gp-rating-plain .gp-site-rating-selection{background-image:url('https://www.spiceworks.com/wp-content/themes/gauge/lib/images/site-rating-slider-rated.png');}.gp-rating-gauge .gp-site-rating-criteria-text, .gp-rating-plain .gp-site-rating-criteria-text{color:#ffffff;}#gp-sidebar .widgettitle,#gp-sidebar .widget-title,#gp-sidebar .wp-block-search__label{font-family:"Open Sans",Arial, Helvetica, sans-serif;line-height:22px;font-weight:600;font-style:normal;color:#000;font-size:14px;}.gp-element-title h3{color:#f84103;}.gp-see-all-link a{color:#000;}.gp-see-all-link a:hover{color:#f84103;}input,textarea,select,.gp-theme #buddypress .dir-search input[type=search],.gp-theme #buddypress .dir-search input[type=text],.gp-theme #buddypress .groups-members-search input[type=search],.gp-theme #buddypress .standard-form input[type=color],.gp-theme #buddypress .standard-form input[type=date],.gp-theme #buddypress .standard-form input[type=datetime-local],.gp-theme #buddypress .standard-form input[type=datetime],.gp-theme #buddypress .standard-form input[type=email],.gp-theme #buddypress .standard-form input[type=month],.gp-theme #buddypress .standard-form input[type=number],.gp-theme #buddypress .standard-form input[type=password],.gp-theme #buddypress .standard-form input[type=range],.gp-theme #buddypress .standard-form input[type=search],.gp-theme #buddypress .standard-form input[type=tel],.gp-theme #buddypress .standard-form input[type=text],.gp-theme #buddypress .standard-form input[type=time],.gp-theme #buddypress .standard-form input[type=url],.gp-theme #buddypress .standard-form input[type=week],.gp-theme #buddypress .standard-form textarea,.gp-theme #buddypress div.activity-comments form .ac-textarea,.gp-theme #buddypress form#whats-new-form textarea,.wp-block-search__input{background-color:#fff;}input,textarea,select,.gp-theme #buddypress .dir-search input[type=search],.gp-theme #buddypress .dir-search input[type=text],.gp-theme #buddypress .groups-members-search input[type=search],.gp-theme #buddypress .standard-form input[type=color],.gp-theme #buddypress .standard-form input[type=date],.gp-theme #buddypress .standard-form input[type=datetime-local],.gp-theme #buddypress .standard-form input[type=datetime],.gp-theme #buddypress .standard-form input[type=email],.gp-theme #buddypress .standard-form input[type=month],.gp-theme #buddypress .standard-form input[type=number],.gp-theme #buddypress .standard-form input[type=password],.gp-theme #buddypress .standard-form input[type=range],.gp-theme #buddypress .standard-form input[type=search],.gp-theme #buddypress .standard-form input[type=tel],.gp-theme #buddypress .standard-form input[type=text],.gp-theme #buddypress .standard-form input[type=time],.gp-theme #buddypress .standard-form input[type=url],.gp-theme #buddypress .standard-form input[type=week],.gp-theme #buddypress .standard-form textarea,.gp-theme #buddypress div.activity-comments form .ac-textarea,.bb-global-search-ac.ui-autocomplete,.gp-theme #bbpress-forums div.bbp-the-content-wrapper textarea.bbp-the-content,.wp-block-search__input{border-top:1px solid #ddd;border-bottom:1px solid #ddd;border-left:1px solid #ddd;border-right:1px solid #ddd;}input,textarea,select,.gp-theme #buddypress .dir-search input[type=search],.gp-theme #buddypress .dir-search input[type=text],.gp-theme #buddypress .groups-members-search input[type=search],.gp-theme #buddypress .groups-members-search input[type=text],.gp-theme #buddypress .standard-form input[type=color],.gp-theme #buddypress .standard-form input[type=date],.gp-theme #buddypress .standard-form input[type=datetime-local],.gp-theme #buddypress .standard-form input[type=datetime],.gp-theme #buddypress .standard-form input[type=email],.gp-theme #buddypress .standard-form input[type=month],.gp-theme #buddypress .standard-form input[type=number],.gp-theme #buddypress .standard-form input[type=password],.gp-theme #buddypress .standard-form input[type=range],.gp-theme #buddypress .standard-form input[type=search],.gp-theme #buddypress .standard-form input[type=tel],.gp-theme #buddypress .standard-form input[type=text],.gp-theme #buddypress .standard-form input[type=time],.gp-theme #buddypress .standard-form input[type=url],.gp-theme #buddypress .standard-form input[type=week],.gp-theme #buddypress .standard-form textarea,.gp-theme #buddypress div.activity-comments form .ac-textarea,.wp-block-search__input{font-family:"Open Sans",Arial, Helvetica, sans-serif;font-weight:400;font-style:normal;color:#000;font-size:13px;}input[type="button"],input[type="submit"],input[type="reset"],button,.button,.wp-block-search__button,.gp-notification-counter,.gp-theme #buddypress .comment-reply-link,.gp-notification-counter,.gp-theme #buddypress a.button,.gp-theme #buddypress button,.gp-theme #buddypress div.generic-button a,.gp-theme #buddypress input[type=button],.gp-theme #buddypress input[type=reset],.gp-theme #buddypress input[type=submit],.gp-theme #buddypress ul.button-nav li a,a.bp-title-button,.gp-theme #buddypress .activity-list #reply-title small a span,.gp-theme #buddypress .activity-list a.bp-primary-action span,.woocommerce #respond input#submit.alt,.woocommerce a.button.alt,.woocommerce button.button.alt,.woocommerce input.button.alt,#gp-dropdowncart .woocommerce a.button{background-color:#F84103;}input[type="button"]:hover,input[type="submit"]:hover,input[type="reset"]:hover,button:hover,.button:hover,.wp-block-search__button:hover,.gp-theme #buddypress .comment-reply-link:hover,.gp-theme #buddypress a.button:hover,.gp-theme #buddypress button:hover,.gp-theme #buddypress div.generic-button a:hover,.gp-theme #buddypress input[type=button]:hover,.gp-theme #buddypress input[type=reset]:hover,.gp-theme #buddypress input[type=submit]:hover,.gp-theme #buddypress ul.button-nav li a:hover,a.bp-title-button:hover,.gp-theme #buddypress .activity-list #reply-title small a:hover span,.gp-theme #buddypress .activity-list a.bp-primary-action:hover span,.woocommerce #respond input#submit.alt:hover,.woocommerce a.button.alt:hover,.woocommerce button.button.alt:hover,.woocommerce input.button.alt:hover,#gp-dropdowncart .woocommerce a.button:hover{background-color:#5fa2a5;}input[type="button"],input[type="submit"],input[type="reset"],button,.button,.wp-block-search__button,.gp-theme #buddypress .comment-reply-link,.gp-theme #buddypress a.button,.gp-theme #buddypress button,.gp-theme #buddypress div.generic-button a,.gp-theme #buddypress input[type=button],.gp-theme #buddypress input[type=reset],.gp-theme #buddypress input[type=submit],.gp-theme #buddypress ul.button-nav li a,a.bp-title-button,.gp-theme #buddypress .activity-list #reply-title small a span,.gp-theme #buddypress .activity-list a.bp-primary-action span,#gp-dropdowncart .woocommerce a.button{color:#ffffff;}input[type="button"]:hover,input[type="submit"]:hover,input[type="reset"]:hover,button:hover,.button:hover,.wp-block-search__button:hover,.gp-theme #buddypress .comment-reply-link:hover,.gp-theme #buddypress a.button:hover,.gp-theme #buddypress button:hover,.gp-theme #buddypress div.generic-button a:hover,.gp-theme #buddypress input[type=button]:hover,.gp-theme #buddypress input[type=reset]:hover,.gp-theme #buddypress input[type=submit]:hover,.gp-theme #buddypress ul.button-nav li a:hover,a.bp-title-button:hover,.gp-theme #buddypress .activity-list #reply-title small a span,.gp-theme #buddypress .activity-list a.bp-primary-action span,#gp-dropdowncart .woocommerce a.button:hover{color:#ffffff;}.gp-footer-widget .widgettitle,.gp-footer-widget .widget-title,.gp-footer-widget .wp-block-search__label{font-family:"Open Sans",Arial, Helvetica, sans-serif;line-height:22px;font-weight:400;font-style:normal;color:#fff;font-size:18px;}.gp-footer-widget{font-family:"Open Sans",Arial, Helvetica, sans-serif;line-height:23px;font-weight:400;font-style:normal;color:#fff;font-size:15px;}.gp-footer-larger-first-col .gp-footer-1 .widgettitle,.gp-footer-larger-first-col .gp-footer-1 .widget-title,.gp-footer-larger-first-col .gp-footer-1 .wp-block-search__label{font-family:"Open Sans",Arial, Helvetica, sans-serif;line-height:22px;font-weight:400;font-style:normal;color:#fff;font-size:18px;}.gp-footer-larger-first-col .gp-footer-1{font-family:"Open Sans",Arial, Helvetica, sans-serif;line-height:23px;font-weight:400;font-style:normal;color:#fff;font-size:15px;}.gp-footer-larger-first-col .gp-footer-1 a{color:#fff;}#gp-copyright{font-family:"Open Sans",Arial, Helvetica, sans-serif;line-height:16px;font-weight:400;font-style:normal;font-size:11px;}#gp-copyright a{color:#b7b4b4;}#gp-copyright a:hover{color:#ddd;}#gp-to-top{background-color:#007fa2;}#gp-to-top{color:#ffffff;}#buddypress .activity-list .activity-content .activity-header,#buddypress .activity-list .activity-content .comment-header,#buddypress .activity-list .activity-header a,#buddypress .activity-list div.activity-comments div.acomment-meta,#buddypress .activity-list .acomment-meta a,.widget.buddypress .item-title a,.widget.buddypress div.item-options.gp-small-item-options:before,.widget.buddypress div.item-options a,#buddypress ul.item-list li div.item-title a,#buddypress ul.item-list li h4 > a,#buddypress ul.item-list li h5 > a,#buddypress div#item-header div#item-meta{color:#000000;}#buddypress .activity-list a.activity-time-since,.widget_display_replies ul li a + div,.widget_display_topics ul li a + div,#buddypress .activity-list .activity-content .activity-inner,#buddypress .activity-list .acomment-meta a.activity-time-since,#buddypress .activity-list div.activity-comments div.acomment-content,.widget.buddypress div.item-meta,#buddypress span.activity,#buddypress ul.item-list li div.meta{color:#aaaaaa;}.gp-theme #buddypress .activity-list div.activity-meta a.button,.gp-theme #buddypress .activity .acomment-options a,.gp-theme #buddypress .activity-list li.load-more a,.gp-theme #buddypress .activity-list li.load-newest a,.widget.buddypress div.item-options a.selected{color:#e93100;}.gp-theme #buddypress .activity-list div.activity-meta a.button:hover,.gp-theme #buddypress .activity .acomment-options a:hover,.gp-theme #buddypress .activity-list li.load-more a:hover,.gp-theme #buddypress .activity-list li.load-newest a:hover,.widget.buddypress div.item-options a.selected:hover{color:#000;}.gp-theme #buddypress ul.item-list li,.gp-theme #buddypress div.activity-comments ul li:first-child,.widget.buddypress #friends-list li,.widget.buddypress #groups-list li,.widget.buddypress #members-list li,.gp-theme .bp-dynamic-block-container ul.item-list li{border-top:1px solid #e0e0e0;border-bottom:1px solid #e0e0e0;}.gp-theme #buddypress div.item-list-tabs{background-color:#000000;}.gp-theme #buddypress div.item-list-tabs ul li a span,.gp-theme #buddypress div.item-list-tabs ul li a:hover span,.gp-theme #buddypress div.item-list-tabs ul li.current a span,.gp-theme #buddypress div.item-list-tabs ul li.selected a span{color:#000000;}.gp-theme #buddypress div.item-list-tabs ul li a span{background-color:#b1b1b1;}.gp-theme #buddypress div.item-list-tabs ul li a, .gp-theme #buddypress #gp-bp-tabs-button, .gp-theme #buddypress div.item-list-tabs ul li span{color:#b1b1b1;}.gp-theme #buddypress div.item-list-tabs ul li.current a, .gp-theme #buddypress div.item-list-tabs ul li.selected a,.gp-theme #buddypress div.item-list-tabs ul li a:hover{color:#ffffff;}.gp-theme #buddypress div.item-list-tabs ul li a:hover span,.gp-theme #buddypress div.item-list-tabs ul li.current a span,.gp-theme #buddypress div.item-list-tabs ul li.selected a span{background:#ffffff;}.gp-theme #buddypress div.item-list-tabs#subnav ul, .widget.buddypress div.item-options.gp-small-item-options > a{background-color:#f8f8f8;}.gp-theme #buddypress div.item-list-tabs#subnav ul li a span,.gp-theme #buddypress div.item-list-tabs#subnav ul li a:hover span,.gp-theme #buddypress div.item-list-tabs#subnav ul li.current a span,.gp-theme #buddypress div.item-list-tabs#subnav ul li.selected a span{color:#f8f8f8;}.gp-theme #buddypress div.item-list-tabs#subnav ul li a span{background-color:#000000;}.gp-theme #buddypress div.item-list-tabs#subnav ul li a{color:#000000;}.gp-theme #buddypress div.item-list-tabs#subnav ul li.current a, .gp-theme #buddypress div.item-list-tabs#subnav ul li.selected a, .gp-theme #buddypress div.item-list-tabs#subnav ul li a:hover{color:#e93100;}.gp-theme #buddypress div.item-list-tabs#subnav ul li a:hover span,.gp-theme #buddypress div.item-list-tabs#subnav ul li.current a span,.gp-theme #buddypress div.item-list-tabs#subnav ul li.selected a span{background:#e93100;}#bbpress-forums .gp-forum-home.bbp-forums .bbp-has-subforums .bbp-forum-info > .bbp-forum-title,#bbpress-forums .bbp-topics .bbp-header,#bbpress-forums .bbp-replies .bbp-header,#bbpress-forums .bbp-search-results .bbp-header{background-color:#353535;}#bbpress-forums .gp-forum-home.bbp-forums .bbp-has-subforums .bbp-forum-info > .bbp-forum-title,#bbpress-forums .bbp-topics .bbp-header,#bbpress-forums .bbp-replies .bbp-header,#bbpress-forums .bbp-search-results .bbp-header{color:#ffffff;}#bbpress-forums .bbp-header div.bbp-reply-content a{color:#ddd;}#bbpress-forums .bbp-header div.bbp-reply-content a:hover{color:#fff;}#bbpress-forums .bbp-forums-list li.odd-forum-row,#bbpress-forums div.odd,#bbpress-forums ul.odd{background-color:#f8f8f8;}#bbpress-forums .bbp-forums-list li.even-forum-row,#bbpress-forums div.even,#bbpress-forums ul.even{background-color:#fff;}#bbpress-forums .gp-forum-home.bbp-forums .bbp-forum-info > .bbp-forum-title,#bbpress-forums div.bbp-forum-header,#bbpress-forums div.bbp-topic-header,#bbpress-forums div.bbp-reply-header,#bbpress-forums .bbp-forums-list,#bbpress-forums li.bbp-body{border-top:1px solid #ddd;border-bottom:1px solid #ddd;border-left:1px solid #ddd;border-right:1px solid #ddd;}#bbpress-forums .bbp-forums-list .bbp-forum .bbp-forum-link,body.forum #bbpress-forums .bbp-forums .bbp-forum-info > .bbp-forum-title,#bbpress-forums .bbp-topics .bbp-topic-permalink,#bbpress-forums .gp-forum-home.bbp-forums .bbp-forum-info > .bbp-forum-title{color:#000000;}#bbpress-forums div.bbp-forum-author .bbp-author-role,#bbpress-forums div.bbp-topic-author .bbp-author-role,#bbpress-forums div.bbp-reply-author .bbp-author-role{background-color:#e93100;}#bbpress-forums div.bbp-forum-author .bbp-author-role,#bbpress-forums div.bbp-topic-author .bbp-author-role,#bbpress-forums div.bbp-reply-author .bbp-author-role{color:#ffffff;}</style><noscript><style> .wpb_animate_when_almost_visible { opacity: 1; }</style></noscript><meta name="zd_ptax_version" content="zdb2bV1" /> <meta name="zd_ptax" content="Security General" /> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script> <!-- Pogo and ZDConsent snippets starts--> <link rel="preload" href="https://cdn.ziffstatic.com/jst/zdconsent.js" as="script"> <script type="text/javascript">window.zdconsent = window.zdconsent || {'run': [], 'cmd':[], 'analytics':[], 'functional':[], 'social':[] };</script> <script type="text/javascript" src="https://cdn.ziffstatic.com/jst/zdconsent.js" async="true"></script> <link rel="preload" as="script" href="https://cdn.ziffstatic.com/pg/toolbox.js"> <script type="text/javascript" id="pogo" src="https://cdn.ziffstatic.com/pg/toolbox.js" async="true"></script> <link rel="preload" as="script" href="https://cdn.ziffstatic.com/pg/toolbox.prebid.js"> <link rel="preload" as="style" href="https://cdn.ziffstatic.com/pg/toolbox.css" onload="this.onload=null;this.rel='stylesheet'"> <link rel="preload" as="script" href="https://securepubads.g.doubleclick.net/tag/js/gpt.js"> <script type="text/javascript" src="https://securepubads.g.doubleclick.net/tag/js/gpt.js" async="true"></script> <link rel="preload" href="https://cdn.static.zdbb.net/js/z0WVjCBSEeGLoxIxOQVEwQ.min.js" as="script"> <script type="text/javascript" src="https://cdn.static.zdbb.net/js/z0WVjCBSEeGLoxIxOQVEwQ.min.js" async></script> <!-- Pogo and ZDConsent snippets ends--> <!-- static pages css --> <!--<link rel="preconnect" href="https://fonts.gstatic.com" crossorigin> <link href="https://fonts.googleapis.com/css2?family=PT+Serif:ital,wght@0,400;0,700;1,400;1,700&display=swap" rel="preload" as="font" type="font/woff2" />--> <script type="text/javascript"> jQuery(document).ready(function() { jQuery('#prop-sw .prop-sw-icon').click(function() { jQuery('.using-focus .prop-sw-wrapper').attr('style', 'display:block'); jQuery('#prop-sw .prop-sw-wrapper a:last-child').addClass("keyfocout"); }); jQuery(".prop-sw-wrapper").focusout(function(){ //alert('Hello World'); jQuery('.using-focus .prop-sw-wrapper').attr('style', 'display:none'); // adding active class }); jQuery(".join-login_change-view-link").focusout(function(e) { jQuery(this).next('.join-login_modal_close').focus(); //jQuery().focusin(); }); jQuery('.popular-insights-item').each(function() { jQuery(this).parents('.popular-section').show(); }); jQuery('.popular-list').each(function() { jQuery(this).parents('.popular-section').show(); }); }); jQuery(document).ready(function() { jQuery('.lean-navbar-drawer__submenu-items li a, .lean-navbar-drawer__menu li a, .search-wrapper .trending-topics a, .prop-sw-wrapper a, .mo-openid-app-icons .horizontal a, .alm-btn-wrap .alm-load-more-btn a, .homepage-popular-listing a, .search-wrapper input, .prop-sw-link').attr('tabindex', '0'); /*jQuery('.prop-sw-arrow').attr('role','button').attr('tabindex', '0');*/ jQuery('.lean-navbar-drawer__submenu-items li').removeAttr('tabindex', '0'); /*jQuery(".prop-sw-icon").replaceWith("<button class='prop-sw-icon' tabindex='0' type='button'><span class='prop-sw-icon-top-left'></span><span class='prop-sw-icon-top-right'></span><span class='prop-sw-icon-bot-left'></span><span class='prop-sw-icon-bot-right'></span></button>");*/ jQuery("#prop-sw").appendTo($(".lean-navbar-drawer")); jQuery('.lean-navbar-drawer__submenu-items li:last-child').addClass('keyfocout'); document.body.addEventListener('keydown', function(event) { if (event.keyCode === 9) { document.body.classList.add('using-focus'); } }); document.body.addEventListener('keydown', function(event) { if (event.keyCode === 27) { document.body.classList.remove('using-focus'); } }); document.body.addEventListener('click', function(event) { if (event.button == 0) { document.body.classList.remove('using-focus'); } }); jQuery(".prop-sw-icon").focus(function(){ jQuery(this).addClass("prop-sw-icon-active"); // adding active class jQuery('.prop-sw-arrow').addClass("prop-sw-arrow-active"); // adding active class }); jQuery(".prop-sw-icon").focusout(function(){ jQuery(this).removeClass("prop-sw-icon-active"); // adding active class jQuery('.prop-sw-arrow').removeClass("prop-sw-arrow-active"); // adding active class }); $(document).keydown(function(e) { if (e.keyCode == 9) { /*jQuery(".lean-navbar-drawer__submenu").focus(function(){ jQuery(this).addClass("lean-navbar-drawer__submenu--open"); // adding active class });*/ jQuery(".lean-navbar-drawer__submenu-items li.keyfocout").focusout(function(){ jQuery(".lean-navbar-drawer__submenu").removeClass("lean-navbar-drawer__submenu--open"); // adding active class }); } }); document.addEventListener('keyup', function(event) { if (event.key === 'Escape') { jQuery(".lean-navbar-drawer__submenu").removeClass("lean-navbar-drawer__submenu--open"); // adding active class } }); jQuery('.lean-navbar-drawer__submenu, .mo-openid-app-icons .horizontal a, .alm-load-more-btn, .prop-sw-icon, .prop-sw-arrow, .gp-entry-text img').keypress(function(event) { if (event.keyCode === 13) { jQuery(this).click(); } }); jQuery('.prop-sw-footer:last-child').focusout( function () { jQuery('.prop-sw-wrapper').addClass('hidden'); } ); function switchTag(e, toTag) { var outerHTML = e.outerHTML; outerHTML = outerHTML.replace(/^<([a-z])(.*?)>(.*?)<\/\1>$/ig, "<" + toTag + "$2>$3</" + toTag + ">"); e.outerHTML = outerHTML; }; /*$('.gp-entry-text b, .as-main b, .entry-content b').replaceWith(function() { //return $('<strong>').append($(this).html()) switchTag(this, "strong"); }); $('.gp-entry-text i, .as-main i, .entry-content i, .wpb-content-wrapper i').replaceWith(function() { //return $('<em>').append($(this).html()) switchTag(this, "em"); });*/ $('.right-section-1 h3').replaceWith(function() { return $('<h2>').append($(this).html()) }); $('.gp-entry-text').find('tr:first-child td').each(function() { $(this).replaceWith($('<th>' + $(this).html() + '</th>')); }); }); </script> <script type="text/javascript"> window.COMMUNITY_URL = 'https://community.spiceworks.com'; window.IDENTITY_URL = 'https://accounts.spiceworks.com'; window.NEWS_INSIGHT_URL = 'https://www.spiceworks.com'; /*jQuery(document).ready(function() { jQuery("#description a").filter(function() { return this.hostname && this.hostname !== location.hostname; }).addClass('external-link').append('<span class="external-link-icon" style="font-size:0px;line-height: 0px;"><em class="fas fa-external-link-alt" aria-hidden="true"></em>Opens a new window</span>'); jQuery('.external-link').attr('title', 'Opens a new window'); });*/ jQuery('a.site-footer_link.site-footer_brand').append('Footer Logo'); </script> <script src="https://edge.spiceworksstatic.com/service.identity/vite/assets/global-nav.js" crossorigin="anonymous" type="module" defer="defer"></script> </head> <body data-template="articles" data-category ="Security" data-tags ="Security General" class="articles-template-default single single-articles postid-3138658 single-format-standard gp-theme gp-responsive gp-wide-layout gp-retina gp-normal-scrolling gp-back-to-top-desktop gp-fixed-header gp-header-resize gp-header-standard gp-header-overlay gp-top-header gp-cart-all gp-search-enabled gp-large-title gp-right-sidebar wpb-js-composer js-comp-ver-7.9 vc_responsive"> <script type="text/javascript"> var __zddecc = __zddecc || {}; </script> <script src="//zdstatic.spiceworks.com/decc/www_sw.js" async></script> <!-- Google Tag Manager (noscript) --> <noscript><iframe aria-label="googletagmanager" aria-hidden="true" src="https://www.googletagmanager.com/ns.html?id=GTM-PGLF8G" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- NEW Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-KTKRL68F " height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- NEW End Google Tag Manager (noscript) --> <script type="text/javascript"> jQuery(document).ready(function(){ jQuery('.lean-navbar-drawer').attr('role', 'navigation'); jQuery('form').attr('role', 'form'); jQuery('.as-main .author-thumnail a, .author-details a, .gp-entry-text img').attr('tabindex', '0'); jQuery('.lean-navbar-drawer').attr('id', 'topMenu'); jQuery('.gp-page-header.gp-standard-header').attr('role', 'banner'); jQuery('#skiptocontent').hide(); jQuery('#skiptocontent').delay(3000).fadeIn(100); }); </script> <main role="main" id="layout"> <div id="gp-site-wrapper"> <div id="skiptocontent" style="display:none"> <div class="container"> <a href="#topMenu">Skip to Main Navigation</a> <a href="#gp-content">Skip to Main Content</a> <a href="#footer-main">Skip to Footer</a> </div> </div> <div id="gp-page-wrapper"> <!--community navbar starts --> <div class="lean-navbar"> <!-- insert lean nav mobile trigger button here --> <span class="lean-navbar-header__actions"> <span></span> <span class="lean-navbar-header__drawer-trigger lean-navbar-header__drawer-trigger--loading"> <span></span> <span></span> <span></span> </span> </span> <!-- insert spiceworks logo here --> <!-- spiceworks logo --> <div class="lean-navbar-header"> <a href="https://www.spiceworks.com" class="lean-navbar-header__spiceworks-icon">Home<span class="lean-navbar-header__brand"></span></a> </div> <!-- insert avatar/user menu base state here (only if user is logged in) --> <nav class="lean-navbar-drawer"> <!-- insert navigation menus here (using id service response) --> <ul class="lean-navbar-drawer__menu"> <li class="lean-navbar-drawer__submenu"> <div class="lean-navbar-drawer__submenu-title" data-lean-navbar-trigger="submenu"> <span class="lean-navbar-drawer__submenu-back-button"> <span></span> <span></span> <span></span> </span> <a href="#" tabindex="0" class="NIC-menu lean-navbar-drawer__submenu-title--without-link">News & Insights <span class="lean-navbar-drawer__submenu-title-dropdown_arrow"></span> </a> </div> <ul class="lean-navbar-drawer__submenu-items"> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-header" href="https://www.spiceworks.com/news-insights/" > News & Insights Home </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://www.spiceworks.com/tech/artificial-intelligence/" > Artificial Intelligence </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://www.spiceworks.com/tech/innovation/" > Innovation </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://www.spiceworks.com/tech/it-careers-skills/" > IT Careers & Skills </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://www.spiceworks.com/tech/cloud" > Cloud </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://www.spiceworks.com/it-security/cyber-risk-management/" > Cyber Security </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://www.spiceworks.com/hr/future-work/" > Future of Work </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://www.spiceworks.com/sitemap/" > All Categories </a> </li> </ul> </li> <li class="lean-navbar-drawer__submenu"> <div class="lean-navbar-drawer__submenu-title" data-lean-navbar-trigger="submenu"> <span class="lean-navbar-drawer__submenu-back-button"> <span></span> <span></span> <span></span> </span> <a href="#" tabindex="0" class="NIC-menu lean-navbar-drawer__submenu-title--without-link">Community <span class="lean-navbar-drawer__submenu-title-dropdown_arrow"></span> </a> </div> <ul class="lean-navbar-drawer__submenu-items"> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-header" href="https://community.spiceworks.com/" > Community Home </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://community.spiceworks.com/c/cloud-computing-saas/8" > Cloud </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://community.spiceworks.com/c/collaboration/9" > Collaboration </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://community.spiceworks.com/c/hardware/15" > Hardware </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://community.spiceworks.com/c/networking/23" > Networking </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://community.spiceworks.com/c/programming-development/26" > Programming </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://community.spiceworks.com/c/security/28" > Security </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://community.spiceworks.com/c/software/29" > Software </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://community.spiceworks.com/c/data-storage-backup-recovery/10" > Storage </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://community.spiceworks.com/c/vendors/38" > Vendors </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://community.spiceworks.com/c/virtualization/39" > Virtualization </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://community.spiceworks.com/c/windows/41" > Windows </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://community.spiceworks.com/categories" > All Categories </a> </li> </ul> </li> <li class="lean-navbar-drawer__submenu"> <div class="lean-navbar-drawer__submenu-title" data-lean-navbar-trigger="submenu"> <span class="lean-navbar-drawer__submenu-back-button"> <span></span> <span></span> <span></span> </span> <a href="#" tabindex="0" class="NIC-menu lean-navbar-drawer__submenu-title--without-link">Research <span class="lean-navbar-drawer__submenu-title-dropdown_arrow"></span> </a> </div> <ul class="lean-navbar-drawer__submenu-items"> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-header" href="https://www.spiceworks.com/research/" > Research Home </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://www.spiceworks.com/research/it-report/" > State of IT 2025 Report </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://www.spiceworks.com/research/it-spend-report/" > IT Spend Report </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://www.spiceworks.com/research/customer-experience-report/" > Customer Experience Report </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://www.spiceworks.com/research/ai-future-workplace-report/" > Workplace Tech Report </a> </li> </ul> </li> <li class="lean-navbar-drawer__submenu"> <div class="lean-navbar-drawer__submenu-title" data-lean-navbar-trigger="submenu"> <span class="lean-navbar-drawer__submenu-back-button"> <span></span> <span></span> <span></span> </span> <a href="#" tabindex="0" class="NIC-menu lean-navbar-drawer__submenu-title--without-link">IT Tools <span class="lean-navbar-drawer__submenu-title-dropdown_arrow"></span> </a> </div> <ul class="lean-navbar-drawer__submenu-items"> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://www.spiceworks.com/free-cloud-help-desk-software" > Cloud Help Desk </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://www.spiceworks.com/tools/remote-support/" > Remote Support </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://www.spiceworks.com/free-pc-network-inventory-software/" > Inventory Online </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://apps.spiceworks.com/tools/contracts/" > Contracts </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://www.spiceworks.com/free-network-troubleshooting-tool" > Connectivity Dashboard </a> </li> <li> <a class="lean-navbar-drawer__submenu-item lean-navbar-drawer__submenu-item-link" href="https://www.spiceworks.com/tools" > All IT Tools </a> </li> </ul> </li> <li class="lean-navbar-drawer__submenu"> <div class="lean-navbar-drawer__submenu-title" data-lean-navbar-trigger="submenu"> <span class="lean-navbar-drawer__submenu-back-button"> <span></span> <span></span> <span></span> </span> <a class="lean-navbar-drawer__submenu-title--link" href="https://accounts.spiceworks.com/pages/newsletters">Newsletters</a> </a> </div> </li> <li class="lean-navbar-drawer__submenu"> <div class="lean-navbar-drawer__submenu-title" data-lean-navbar-trigger="submenu"> <span class="lean-navbar-drawer__submenu-back-button"> <span></span> <span></span> <span></span> </span> <a class="lean-navbar-drawer__submenu-title--link" href="https://community.spiceworks.com/c/events/14">Events</a> </a> </div> </li> <li class="lean-navbar-drawer__submenu"> <div class="lean-navbar-drawer__submenu-title" data-lean-navbar-trigger="submenu"> <span class="lean-navbar-drawer__submenu-back-button"> <span></span> <span></span> <span></span> </span> <a class="lean-navbar-drawer__submenu-title--link" href="https://www.spiceworks.com/spiceworld/">SpiceWorld</a> </a> </div> </li> </ul> <!-- insert search box base state here--> <div class="search-wrapper"> <!-- <form role="form" class="searchbox"> <span class="searchbox-icon searchbox-ipad" style="display:none;"><i class="fa fa-search" aria-hidden="true"></i></span> <div class="searchBox-fakeInput"> <div class="searchBox-inputWrapper"> <i class="mag-glass"></i> <input class="search-input search-input-spiceworks sr-input form-control searchBox-input" autocomplete="off" maxlength="1500" placeholder="Search Spiceworks" id="search-input-spiceworks" required></input> <div class="searchBox-clearWrapper"> <span class="searchBox-clear-q"><button type="reset" class="btn searchClear" tabindex="0"><i class="fa fa-times"></i></button></span> <label class="search-icon"> <input type="submit" value="" class="" tabindex="0"> <i class="fa fa-search" aria-hidden="true"></i> </label> </div> </div> </div> <span class="searchBox-clear js-clearSearchBox"><i class="fa fa-times"></i></span> <div class="trending-topics" style="display:none;"></div> <div class="search-box-results"></div> </form> --> <form > <i class="mag-glass"></i> <input class="search-input" autocomplete="off" placeholder="Search Spiceworks" disabled></input> <i class="clean-icon" style="display:none" tabindex="0"></i> <i class="clean-icon" tabindex="0"></i> <div class="search-box-results"></div> </form> </div> <!-- insert guest actions inside drawer base state here (only if user is guest) --> <div class="lean-navbar-inside-drawer lean-navbar-drawer__user-actions lean-navbar-drawer__user-actions--logged-out"> <a href="https://accounts.spiceworks.com/sign_in/?referrer_source=newsinsights&referrer_reference=topnav&referer=https%3A%2F%2Fwww.spiceworks.com%2Fit-security%2Fsecurity-general%2Farticles%2Fimportant-cybersecurity-terms%2F&success=https%3A%2F%2Fwww.spiceworks.com%2Fit-security%2Fsecurity-general%2Farticles%2Fimportant-cybersecurity-terms%2F" rel="nofollow" class="lean-navbar-drawer__login-button">Login<!-- insert login text here --></a> <a href="https://accounts.spiceworks.com/join/?referrer_source=newsinsights&referrer_reference=topnav&referer=https%3A%2F%2Fwww.spiceworks.com%2Fit-security%2Fsecurity-general%2Farticles%2Fimportant-cybersecurity-terms%2F" rel="nofollow" class="lean-navbar-drawer__join-button">Join<!-- insert join text here --></a> </div> </nav> <!-- insert guest actions outside drawer base state here (only if user is guest) --> <div class="lean-navbar-outside-drawer lean-navbar-drawer__user-actions lean-navbar-drawer__user-actions--logged-out"> <a href="https://accounts.spiceworks.com/sign_in/?referrer_source=newsinsights&referrer_reference=topnav&referer=https%3A%2F%2Fwww.spiceworks.com%2Fit-security%2Fsecurity-general%2Farticles%2Fimportant-cybersecurity-terms%2F&success=https%3A%2F%2Fwww.spiceworks.com%2Fit-security%2Fsecurity-general%2Farticles%2Fimportant-cybersecurity-terms%2F" rel="nofollow" class="lean-navbar-drawer__login-button">Login<!-- insert login text here --></a> <a href="https://accounts.spiceworks.com/join/?referrer_source=newsinsights&referrer_reference=topnav&referer=https%3A%2F%2Fwww.spiceworks.com%2Fit-security%2Fsecurity-general%2Farticles%2Fimportant-cybersecurity-terms%2F" rel="nofollow" class="lean-navbar-drawer__join-button">Join<!-- insert join text here --></a> </div> </div> <div id='join-login-modal-wrapper' class='join-login-wrapper'> <join-login-main-content :version='version' is-connect-product='0' display-type='modal' :is-shown.sync='isShown' :recaptcha-enabled='true' recaptcha-key='6LcGSvYiAAAAAEIee_n3eNYguqzTe_TJfCH4YuLj' signup-type='default' user-country='N/A' source='Modal' ></join-login-main-content> </div> <!--community navbar ends--> <!-- header bar elements and ad's script moved to GTM --> <style> .gp-page-header .gp-container { padding-top: 10px!important; } </style> <div class="marquee-main"> <style> #block-6, #block-4{display: contents !important;} .marquee-main {background-color:#007495;text-align:center;margin-top:0px;display: table;width: 100%;} .marquee-main h3 {font-size: 29px;line-height: 35px;color: #fff!important;padding: 16px 15px 16px;font-weight: 500;margin:0px 0px;} .marquee-main h3 a {text-decoration:underline;color:#fff;} .marquee-main h3 a:hover {text-decoration:none;color:#fff;} .marquee-main .widget, .marquee-main .widget_block {margin: 0px;} @media(max-width:767px) { .marquee-main h3 {font-size: 26px;line-height: 34px;color: #fff;padding: 15px 15px 8px;font-weight: 500;} } @media only screen and (max-width: 600px) { .ee_editable h1, h1.ee_editabl{line-height: 1.2 !important;} } @media(min-width:1024px) { .gp-page-header, .desk-header {min-height: 291px !important;} } </style> </div> <header class="gp-page-header gp-standard-header" role="banner"> <div class="gp-container"> <div data-pogo="top"></div> </div> </header> <div id="gp-content-wrapper" class="gp-container gp-container-1"> <hr/> <div id="gp-content"> <style type="text/css"> #gp-content-wrapper.gp-container > #gp-content {padding: 0px 0;} a{color: #65BA2D;} input[type="submit"] {background-color: #65BA2D !important;} .new_recommended_reads {display: table;width: 100%;background: #fff;position: relative;z-index: 5;} </style> <div class="col-md-12 nopadding"> <div class="col-md-8 article-content"> <div class="show-category"> <a class="content-page-article-topic-top" href="https://www.spiceworks.com/it-security/security-general/" rel="dofollow" data-cms-ai="0">Security General</a> </div> <div class="MixedUseItem-headline"> <h1 id="title" class="ArticleMain-headline article-title" rel="dofollow" data-cms-ai="0">25 Security Terms You Should Know for Cybersecurity Awareness Month</h1> </div> <div class="MixedUseItem-description article-excerpt" id="excerpt"> <p>If you want to reduce your organization’s cyber risk, your employees must take a greater interest in cybersecurity. Brush off your knowledge this Cybersecurity Awareness Month with 25 common security terms. </p> </div> <article class="post-3138658 articles type-articles status-publish format-standard has-post-thumbnail tag-cybersecurity tag-malware tag-phishing tag-ransomware topic-security-general" > <meta itemType="https://schema.org/WebPage" content="https://www.spiceworks.com/it-security/security-general/articles/important-cybersecurity-terms/"> <meta content="25 Security Terms You Should Know for Cybersecurity Awareness Month"> <div > <meta content="https://images.spiceworks.com/wp-content/uploads/2021/10/04053151/shutterstock_1817476859.jpg"> <meta content="300"> <meta content="300"> </div> <meta content="Abhijit Ahaskar"> <meta content="2024-10-02"> <meta content="2024-10-02"> <div > <div > <meta content="https://www.spiceworks.com/wp-content/uploads/2022/11/spiceworkslogo.png"> <meta content="220"> <meta content="69"> </div> <meta content="Spiceworks Inc"> </div> <div class="gp-post-thumbnail gp-entry-featured"> <style type="text/css">.ArticleMain-lead{margin-top: 40px !important} .ArticleMain-lead img{ width: 800px;}</style> </div> <div class="as-main"> <div class="col-lg-9 col-md-9 col-sm-9 col-xs-12 author-details-8"> <div class="multiple-author1"> <div class="gp-entry-meta single-author"> <span class="author-thumnail"> <a href="https://www.spiceworks.com/user/about/abhijit-ahaskar/" data-cms-ai="0" title="Abhijit Ahaskar"> <img src= "https://images.spiceworks.com/wp-content/uploads/2021/06/03053736/Mugshot-150x150.jpg" alt="Abhijit Ahaskar" class="author-thum-img" width="40" height="40"> </a> </span> <span class="author-thumnail" style="margin-left:-25px!important"> <a href="https://www.spiceworks.com/user/about/nancy/" data-cms-ai="0" title="Nancy Simeone"> <img src= "https://images.spiceworks.com/wp-content/uploads/2024/03/28214600/NancySimeone-150x150.png" alt="Nancy Simeone" class="author-thum-img" width="40" height="40"> </a> </span> <span class="author-details top-margin-15"> <span class="mobile-width"> <span class="multi-authors"> <style type="text/css"> @media screen and (min-device-width: 320px) and (max-device-width: 767px) { .multi-authors{margin-top:15px !important;} @supports (-moz-appearance:none){ .multi-authors{margin-top: 15px !important;} }}</style> <a href="https://www.spiceworks.com/user/about/abhijit-ahaskar/" data-cms-ai="0">Abhijit Ahaskar</a><span class="auth_and auth_and_mb"> & </span> <a href="https://www.spiceworks.com/user/about/nancy/" data-cms-ai="0">Nancy Simeone</a> </span> </span> </span> </div> </div> </div> <div class="col-md-3 col-sm-3 author-details-4"> <div datetime="2024-10-02T20:17:47+00:00">October 2, 2024</div> </div> <hr class="author-hr"> </div> <div class="col-md-1 col-sm-1 social-share-icons"> <div class="mo-openid-app-icons circle "><p style="margin-top:4% !important; margin-bottom:0px !important; color:#000000"></p><div class='horizontal'><a rel='nofollow' title='facebook' onclick='popupCenter("https://www.facebook.com/sharer/sharer.php?u=https://www.spiceworks.com/it-security/security-general/articles/important-cybersecurity-terms/&src=sdkpreparse", 800, 500);' class='mo-openid-share-link' style='margin-left : -2px !important'><i class=' square fab fa-facebook' style='padding-top:4px;text-align:center;color:#76797A;font-size:36px !important;height:36px !important;width:36px !important;'></i></a><a rel='nofollow' title='twitter' onclick='popupCenter("https://twitter.com/intent/tweet?text=25 Security Terms You Should Know for Cybersecurity Awareness Month&url=https://www.spiceworks.com/it-security/security-general/articles/important-cybersecurity-terms/", 800, 500);' class='mo-openid-share-link' style='margin-left : -2px !important'><i class=' square fab fa-twitter' style='padding-top:4px;text-align:center;color:#76797A;font-size:36px !important;height:36px !important;width:36px !important;'></i></a><a rel='nofollow' title='linkedin' onclick='popupCenter("https://www.linkedin.com/shareArticle?mini=true&title=25 Security Terms You Should Know for Cybersecurity Awareness Month&url=https://www.spiceworks.com/it-security/security-general/articles/important-cybersecurity-terms/&summary=", 800, 500);' class='mo-openid-share-link' style='margin-left : -2px !important'><i class=' square fab fa-linkedin' style='padding-top:4px;text-align:center;color:#76797A;font-size:36px !important;height:36px !important;width:36px !important;'></i></a></div></p></div><br/><script>function popupCenter(pageURL, w,h) {var left = (screen.width/2)-(w/2);var top = (screen.height/2)-(h/2);var targetWin = window.open (pageURL, '_blank','toolbar=no, location=no, directories=no, status=no, menubar=no, scrollbars=no, resizable=no, copyhistory=no, width='+w+', height='+h+', top='+top+', left='+left);}function pinIt(){var e = document.createElement("script");e.setAttribute('type','text/javascript');e.setAttribute('charset','UTF-8');e.setAttribute('src','https://assets.pinterest.com/js/pinmarklet.js?r='+Math.random()*99999999); document.body.appendChild(e);}</script> </div> <div class="col-md-11 col-sm-11 article-description"> <div class="ArticleMain-lead1" id="article-featured-img"> </div> <div class="gp-entry-content aligmentchange gp-"> <div id="description" class="gp-entry-text" > <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd"> <?xml encoding="utf-8" ?><html><body><p><span style="font-weight: 400">October is Cybersecurity Awareness Month, and most companies will host at least one workshop, training, or cybersecurity awareness webinar for their employees. Unfortunately, these sessions won’t be very effective if your users don’t understand the most commonly used security terms. </span></p> <p>The National Cybersecurity Alliance’s Annual <em><a href="https://programs.staysafeonline.org/oh-behave-2024" rel="noopener" title="Opens a new window" target="_blank">Cybersecurity Attitudes and Behaviors Report<span class="external-link-icon">Opens a new window <em class="fas fa-external-link-alt" aria-hidden="true"></em></span></a></em> found that 53% of participants are always connected online. Some of your employees likely fall into that group. The same study also found that employees mainly believe the IT department (44%) and security department (44%) are responsible for the security of workplace information and that personal responsibility declined by 3%.</p> <p><span style="font-weight: 400">Clearly, employers need to take a larger role in ensuring their employees understand the impact of poor cyber hygiene. As Jason Stirland, CTO of The Coaches’ Voice, told Spiceworks in 2022, “Cybersecurity Awareness Month is an ideal time to refresh employees with cybersecurity awareness training. After all, refreshing training ensures employees stay aware of new cybersecurity risks.” </span></p> <p>Here are 25 security terms you’ll hear at least once during Cybersecurity Awareness Month. Test your knowledge and be sure you know what they all mean. You never know when you’ll have to explain them to a colleague, client, or relative.</p> <h2>Security Terms – General Threats</h2> <h3>1. Advanced Persistent Threat (APT)</h3> <p><span style="font-weight: 400">An advanced persistent threat (APT) is a form of cyberattack wherein an attacker uses advanced techniques to infiltrate a system or a network and stay undetected for as long as possible. The ultimate goal is to steal critical information over a long period. A lot of effort and resources are required to Since the effort required to carry out such an attack is high, APTs usually aim at high-value targets such as nation-states and large corporations. APT attackers are increasingly going after smaller companies that are part of larger organization’s supply chain networks. Smaller companies don’t have the cyber resources of large organizations and are usually poorly defended, which makes it easier to target them. </span></p> <p><strong>Further Reading: </strong><a href="https://www.spiceworks.com/it-security/vulnerability-management/articles/what-is-advanced-persistent-threat/"><span style="font-weight: 400">What Is an Advanced Persistent Threat?</span></a> | <a href="https://www.spiceworks.com/it-security/endpoint-security/guest-article/everything-you-need-to-know-about-advanced-persistent-threats-apts/">Everything You Need to Know About Advanced Persistent Threats (APTs)</a> | <a href="https://www.spiceworks.com/it-security/network-security/articles/signs-of-advanced-persistent-threat-attacks/">6 Tell-Tale Signs of APT Attacks</a></p> <h3>2. Distributed-Denial-of-Service (DDoS)</h3> <p><span style="font-weight: 400">A distributed denial-of-service (DDoS) attack disrupts a server, website or network by suddenly overwhelming it with large volumes of unexpected traffic it is unable to handle. One common way threat actors use to to carry out a DDoS attack is to first infect thousands of computer systems or IoT devices with malware. These devices are essentially “robots” under control of the threat actor, who uses the combined power of the systems to create a botnet. This botnet is then used to generate large amounts of traffic. DDoS attacks are sometimes also used as a distraction to carry out data theft or network infiltration. According to Imperva’s 2024 <em><a href="https://www.imperva.com/blog/unveiling-the-2024-imperva-ddos-threat-landscape-report/" rel="noopener" title="Opens a new window" target="_blank">DDoS Threat Landscape Report<span class="external-link-icon">Opens a new window <em class="fas fa-external-link-alt" aria-hidden="true"></em></span></a></em>, the number of DDoS attacks year-over-year have increased at dramatic percentages for the gaming (208%), healthcare (236%) and telecommunications and ISP (548%) industries. </span></p> <p><strong>Further Reading: </strong><a href="https://www.spiceworks.com/it-security/network-security/articles/what-is-ddos/"><span style="font-weight: 400">What Is DDoS (Distributed Denial of Service)?</span></a> | <a href="https://www.spiceworks.com/tech/iot/guest-article/how-to-stop-the-rise-of-weaponized-iot-botnets/">How to Stop the Rise of Weaponized IoT Botnets</a> | <a href="https://www.spiceworks.com/it-security/network-security/articles/what-is-botnet/">Botnet Attacks – Examples and Prevention</a></p> <figure class="article-thumbnail"><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-3179589" src="https://images.spiceworks.com/wp-content/uploads/2024/10/02164746/CloudflareDDosCount.png" alt="Security Terms: DDoS - Cloudflare mitigated 13.9 million DDoS attacks in 2023" width="560" height="241"></figure> <h3>3. Malware</h3> <p><span style="font-weight: 400">Malicious software that is purposely developed to damage, disrupt, or infiltrate electronics is referred to as malware. This type of software can also be used when a bad actor wants to open a gateway or backdoors in a system or network. These entrance points allow attackers to remotely plant other malicious software without requiring authentications from the user or system admin. Malware typically stays hidden and causes damage without the knowledge of the user. </span></p> <p><strong>Further Reading: </strong><a href="https://www.spiceworks.com/it-security/endpoint-security/articles/what-is-malware-types-removal/"><span style="font-weight: 400">What Is Malware?</span></a> | <a href="https://www.spiceworks.com/it-security/data-security/articles/what-is-malware-analysis-definition-types-stages-best-practices/">What Is Malware Removal?</a> | <a href="https://www.spiceworks.com/it-security/vulnerability-management/news/meet-the-top-10-nastiest-malware-of-2020-webroot/">Meet the Top 10 Nastiest Malware of 2020</a></p> <h3>4. Phishing</h3> <p><span style="font-weight: 400">Phishing is a widely used term in cybersecurity that describes an attempt to manipulate users into sharing personal or other credentials. These credentials can be used to hijack the victim’s social media or banking accounts. When attackers use emails as the medium for these attacks, they are called phishing email attacks. These emails are deftly crafted so that they look genuine and pique the interest of the target. The objective is to get victims to believe that the email has been sent by a genuine person or an organization to get them to click on the malicious links or attachments and plant malware on their system.</span></p> <p><strong>Further Reading: </strong><a href="https://www.spiceworks.com/it-security/vulnerability-management/articles/what-is-a-phishing-email-attack/"><span style="font-weight: 400">What Is a Phishing Email Attack?</span></a> | <a href="https://www.spiceworks.com//www.spiceworks.com/it-security/cyber-risk-management/guest-article/battling-phishing-and-business-email-compromise-attacks/">Battling Phishing and Business Email Compromise Attacks</a> | <a href="https://www.spiceworks.com/tech/artificial-intelligence/guest-article/why-ai-phishing-is-code-red-for-businesses/">AI Phishing Is Code Red for Businesses</a></p> <h3>5. Ransomware</h3> <p><span style="font-weight: 400">Ransomware is a form of malware that uses encryption to block an organization’s access to their systems, files, databases, or applications until they agree to pay a ransom. The software is designed to spread across the network and target database and file servers and can quickly paralyze an entire organization and disrupt business operations. It is considered one of the most lucrative forms of cyberattacks as many organizations choose to pay the ransom to prevent losses incurred due to business disruption. Every year ransomware actors make billions of dollars through ransom payments. To put more pressure on organizations, some ransomware groups also steal critical data before encrypting it and then threaten to sell it on the dark web if the ransom isn’t paid.</span><span style="font-weight: 400"><br> </span></p> <p><strong>Further Reading: </strong><a href="https://www.spiceworks.com/it-security/vulnerability-management/articles/what-is-a-ransomware-attack/"><span style="font-weight: 400">What Is a Ransomware Attack?</span></a> | <a href="https://www.spiceworks.com/it-security/vulnerability-management/guest-article/ransomware-the-pros-and-cons-of-paying-demands/">Ransomware: The Pros and Cons of Paying</a> | <a href="https://www.spiceworks.com/it-security/vulnerability-management/guest-article/evolution-of-ransomware-tactics/">The Evolution of Ransomware Tactics</a></p> <figure class="article-thumbnail"><img decoding="async" class="aligncenter size-full wp-image-3179590" src="https://images.spiceworks.com/wp-content/uploads/2024/10/02164912/RansomwarePayments.png" alt="Security Terms - Ransomware - Ransomware payments hit $1.1 billion in 2023" width="560" height="240"></figure> <h3>6. Shadow IT</h3> <p><span style="font-weight: 400">Shadow IT refers to those applications, software, services, or devices that fall outside the purview of an organization’s IT team and have not been vetted and approved for use. Yet, such apps are widely used by business units and users. With the increase in cloud adoption, the use of shadow IT has also grown exponentially to plug the gaps left by company-approved applications. Due to a lack of visibility over shadow IT, IT teams cannot protect them from cyberattacks, putting the entire organization at risk. In 2021, <a href="https://blog.1password.com/challenges-of-shadow-it/" rel="noopener" title="Opens a new window" target="_blank">research by 1Password<span class="external-link-icon">Opens a new window <em class="fas fa-external-link-alt" aria-hidden="true"></em></span></a> found that more than half of respondents had created multiple accounts the IT department wasn’t aware of, and almost 16% had created more than five accounts.</span><span style="font-weight: 400"> </span></p> <p><strong>Further Reading: </strong><a href="https://www.spiceworks.com/tech/it-strategy/articles/shadow-it-challenges-and-benefits/">Mitigating the Risks Posed by Shadow IT</a> | <a href="https://www.spiceworks.com/it-security/data-security/guest-article/how-to-keep-corporate-data-safe-in-the-face-of-growing-shadow-it/"><span style="font-weight: 400">How to Keep Data Safe in the Face of Growing Shadow IT</span></a> | <a href="https://www.spiceworks.com/it-security/security-general/guest-article/7-factors-that-indicate-your-organization-has-a-shadow-code-problem/">7 Factors that Indicate You Have a Shadow IT Problem</a></p> <h3>7. Spyware</h3> <p><span style="font-weight: 400">Spyware is also a type of malware but is mostly used for surveillance. Instead of spreading across the network or stealing data, it remains hidden using advanced obfuscation techniques and quietly monitors every activity and communication on the target’s device. Spyware is widely used by criminals to attack high-profile corporate targets. According to a <a href="https://storage.googleapis.com/gweb-uniblog-publish-prod/documents/Year_in_Review_of_ZeroDays.pdf" rel="noopener" title="Opens a new window" target="_blank">2023 report from Google’s Threat Analysis Group and Mandiant<span class="external-link-icon">Opens a new window <em class="fas fa-external-link-alt" aria-hidden="true"></em></span></a>, commercial surveillance vendors have essentially created a new industry out of selling spyware to take advantage of unpatched zero-day exploits.</span><span style="font-weight: 400"><br> </span></p> <p><strong>Further Reading: </strong> <a href="https://www.spiceworks.com/it-security/security-general/articles/what-is-spyware/">What Is Spyware?</a> | <a href="https://www.spiceworks.com/it-security/cyber-risk-management/articles/spyware-threat-against-enterprises/"><span style="font-weight: 400">Spyware: How to Spot an Infection</span></a> | <a href="https://www.spiceworks.com/it-security/application-security/articles/what-is-trojan-horse/">What Is a Trojan Horse?</a></p> <h2>Security Terms – Tactics, Techniques, and Procedures</h2> <h3>8. Social Engineering</h3> <p><span style="font-weight: 400">Social engineering is a set of tactics employed by cybercriminals to gather sensitive information from unsuspecting users. These tactics include background research, social media monitoring, fake customer care calls and sometimes in-person meetings. The motive behind most social engineering tricks is to carry out cyber theft and steal critical information or money. In many instances, attackers use social engineering to target senior-level executives and gain entry into company networks using credentials stolen from them. </span></p> <p><strong>Further Reading: </strong><a href="https://www.spiceworks.com/it-security/vulnerability-management/articles/what-is-social-engineering/"><span style="font-weight: 400">What Is Social Engineering?</span></a></p> <h3>9. Spear Phishing</h3> <p><span style="font-weight: 400">A subset of phishing, spear phishing attacks are a lot more sophisticated, organized, and dangerous. Before carrying out these attacks, threat actors use social engineering to identify corporate insiders who may have privileged access to their organization’s critical resources. Bad actors send emails that appear to be from legitimate contacts, like a supply chain partner, a customer, or a coworker. The emails appear relevant to the targeted employee’s work, so the employee is more likely to react to the email by clicking on a malicious link. </span></p> <p><strong>Further Reading: </strong><a href="https://www.spiceworks.com/security/vulnerability-management/articles/what-is-a-spear-phishing-attack/">What Is a Spear Phishing Attack?</a></p> <figure class="article-thumbnail"><img decoding="async" class="aligncenter size-full wp-image-3179591" src="https://images.spiceworks.com/wp-content/uploads/2024/10/02165027/ZombiePhish.png" alt="Security Terms - Phishing - A zombie phish attack restarts an old thread" width="560" height="240"></figure> <h3>10. Whaling</h3> <p><span style="font-weight: 400">Also known as CEO fraud, whaling is a more targeted form of spear-phishing attack wherein attackers send a fake email in the name of the CEO or C-level executives to other important officials within the organization. The objective of the attack is to draw the victims to a hoax website and trick them into sharing sensitive information such as their login credentials. This information can then be used to steal money or to launch attacks on company networks. </span></p> <p><strong>Further Reading: </strong><a href="https://www.spiceworks.com/it-security/vulnerability-management/articles/what-is-whaling-phishing/"><span style="font-weight: 400">What Is Whaling?</span></a></p> <h2>Security Terms – IT Defense Strategies</h2> <h3>11. Biometric Authentication</h3> <p><span style="font-weight: 400">Biometric authentication is a widely-used method to verify the authenticity of an individual using their biological characteristics such as the face, iris, fingerprint or voice. Most modern-day devices such as smartphones or laptops offer some form of biometric security. With passwords becoming obsolete, enterprises are looking for new ways to secure access to their resources. Biometric security is more secure and reliable than passwords. </span></p> <p><strong>Further Reading: </strong><a href="https://www.spiceworks.com/it-security/identity-access-management/articles/what-is-biometric-authentication-definition-benefits-tools/"><span style="font-weight: 400">What Is Biometric Authentication?</span></a></p> <h3>12. Browser Isolation</h3> <p><span style="font-weight: 400">Most organizations restrict what their employees can access on browsers on their company network or computer systems. This can be frustrating and even throttle productivity in some instances. Browser isolation is a method many organizations use to allow unrestricted web access to their employees without compromising on security. In this method, an employee’s internet activity is isolated from the larger computing environment in which they are operating. This is done by putting all traffic in a sandbox or a virtual machine (local isolation) or by hosting the browsing session on a remote server and streaming it to the user in real-time (remote isolation). </span></p> <p><strong>Further Reading: </strong><a href="https://www.spiceworks.com/it-security/network-security/articles/what-is-browser-isolation-definition-technology-components-vendors/"><span style="font-weight: 400">What Is Browser Isolation?</span></a></p> <h3>13. Cloud Encryption</h3> <p><span style="font-weight: 400">With many businesses migrating to the cloud, securing workloads and databases is more critical than ever. Cloud encryption is one of the most effective methods that protect sensitive cloud data from attackers in case of a breach. In this method, mathematical algorithms encrypt all plain text data and transform into ciphertext, rendering it unreadable. Even if an unauthorized user obtains the information, no one can read the content without the decryption keys. </span></p> <p><strong>Further Reading: </strong><a href="https://www.spiceworks.com/tech/cloud/articles/what-is-cloud-encryption/"><span style="font-weight: 400">What Is Cloud Encryption?</span></a></p> <h3>14. Container Security</h3> <p><span style="font-weight: 400">Container security is a broad term for a set of tools, policies, and processes designed to make a container more secure and resilient to attacks. With the growing use of containers, attacks on them have also increased. Though they are more secure than traditional virtual machines, they are not impenetrable. According to a Red Hat’s 2024 </span><a href="https://www.redhat.com/en/resources/kubernetes-adoption-security-market-trends-overview" rel="noopener" title="Opens a new window" target="_blank"><span style="font-weight: 400">State of Kubernetes security report</span><span class="external-link-icon">Opens a new window <em class="fas fa-external-link-alt" aria-hidden="true"></em></span></a> <span style="font-weight: 400">nearly 9 in 10 organizations had at least 1 container incident in the previous 12 months.</span></p> <p><strong>Further Reading: </strong><a href="https://www.spiceworks.com/it-security/cloud-security/articles/what-is-container-security-definition-components/"><span style="font-weight: 400">What Is Container Security?</span></a></p> <h3>15. Data Loss Prevention (DLP)</h3> <p><span style="font-weight: 400">As data volumes grow, managing and keeping track of data has become a lot more challenging. Loss of critical data can have severe repercussions for any organization. It can lead to loss of intellectual property, tarnish the brand image and invite heavy fines from data regulators. Many organizations are turning to data loss prevention (DLP) solutions to improve visibility over their data landscape. DLPs can mitigate the risk of data loss due to insider threats, negligence, external attacks, or natural disasters by ensuring that the organization has consistent access to all its data resources. </span></p> <p><strong>Further Reading: </strong><a href="https://www.spiceworks.com/it-security/data-security/articles/what-is-data-loss-prevention/"><span style="font-weight: 400">What Is Data Loss Prevention (DLP)?</span></a></p> <h3>16. Firewall</h3> <p><span style="font-weight: 400">A firewall is a vital cog in a company’s security architecture. It monitors all incoming and outgoing network traffic as per the IT team’s instructions with the primary goal of allowing non-threatening traffic and keeping out all malicious traffic. A firewall creates a virtual wall between a private network and the public internet. More advanced firewalls come with in-built integrated intrusion prevention systems, enabling them to block malware and prevent application-layer attacks.</span></p> <p><strong>Further Reading: </strong><a href="https://www.spiceworks.com/it-security/web-security/articles/what-is-firewall-definition-key-components-best-practices/"><span style="font-weight: 400">What Is a Firewall?</span></a></p> <h3>17. Multi-Factor Authentication (MFA)</h3> <p><span style="font-weight: 400">Multi-factor authentication (MFA) is a key component of any organization’s identity and access management (IAM) strategy. It adds a layer of security over the sign-in process required to access cloud resources, web applications, or a virtual private network (VPN). It requires users to furnish two or more verification factors instead of relying only on the username and password for logging into a system. Studies show that this additional process reduces the risk of a cyber attack considerably. Passwords are the most common type of MFA factor organization use. You can share one-time passwords through email, SMS, or an authenticator tool like Google Authenticator, LastPass, or Okta Verify.</span></p> <p><strong>Further Reading: </strong><a href="https://www.spiceworks.com/it-security/identity-access-management/articles/what-is-multi-factor-authentication/"><span style="font-weight: 400">What Is Multi-Factor Authentication?</span></a></p> <h3>18. Identity and Access Management (IAM)</h3> <p><span style="font-weight: 400">Identity and access management (IAM) tools verify the authenticity of requests made by individuals or devices to access systems. IAM solutions improve the IT team’s visibility into who has access to what and ensure that no one misuses access. In the shift to remote work, IAM gained prominence on IT agendas as employees started to request remote access to corporate resources – sometimes with their personal devices. </span></p> <p><strong>Further Reading: </strong><a href="https://www.spiceworks.com/it-security/identity-access-management/articles/what-is-identity-and-access-management/"><span style="font-weight: 400">What Is Identity and Access Management (IAM)?</span></a></p> <h3>19. Incident Response</h3> <p><span style="font-weight: 400">Incident response (IR) is the set of measures an organization takes to minimize the impact of a cyberattack. The measures include detection, analysis, containment, and recovery from a data breach. It also covers post-incident recovery activities such as feeding the information from the data breach to improve the incident response system and provide support to auditors. IR defines the roles and responsibilities of individuals and teams and details communication pathways between the incident response team and the rest of the organization. </span></p> <p><strong>Further Reading: <a href="https://www.spiceworks.com/it-security/vulnerability-management/articles/what-is-incident-response/"><span style="font-weight: 400">What Is Incident Response?</span></a></strong></p> <h3>20. Network Access Control (NAC)</h3> <p><span style="font-weight: 400">Network access control (NAC) is a security solution that keeps unauthorized users and devices from an organization’s private network. As more people use personal devices to access corporate networks, keeping track of who has access to what becomes critical. NAC also makes sense for organizations with large-scale IoT deployments. NAC functions by restricting access to the company’s protected resources to specific users and devices and only to particular areas of the network. So, if a person or device has access to a corporate network, they will still not be able to access any internal resources due to NAC. </span></p> <p><strong>Further Reading: </strong><a href="https://www.spiceworks.com/it-security/network-security/articles/what-is-network-access-control/"><span style="font-weight: 400">What Is Network Access Control?</span></a></p> <h3>21. Privileged Access Management (PAM)</h3> <p><span style="font-weight: 400">A subset of IAM, privileged access management (PAM), is an infosec mechanism that helps organizations manage and secure privileged accounts with access to critical data and accounts. Unlike standard accounts, which have limited access to resources, privileged accounts, if compromised, can have serious repercussions for an organization. Google’s August 2023 </span><em><a href="https://services.google.com/fh/files/blogs/gcat_threathorizons_full_jul2023.pdf" rel="noopener" title="Opens a new window" target="_blank"><span style="font-weight: 400">Threat Horizons Report</span><span class="external-link-icon">Opens a new window <em class="fas fa-external-link-alt" aria-hidden="true"></em></span></a></em><span style="font-weight: 400"> found credential issues remain a challenge and account for over 60% of the factors in compromised cloud environments.</span></p> <p><strong>Further Reading: </strong><a href="https://www.spiceworks.com/it-security/identity-access-management/articles/what-is-privileged-access-management/"><span style="font-weight: 400">What Is Privileged Access Management (PAM)?</span></a></p> <figure class="article-thumbnail"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-3179592" src="https://images.spiceworks.com/wp-content/uploads/2024/10/02165247/StolenCredentials.png" alt="Security Terms - PAM - 86% of breaches involve stolen credentials" width="560" height="240"></figure> <h3>22. Password Managers</h3> <p><span style="font-weight: 400">A password manager is an application that allows users to store and manage their login credentials and passwords. The application stores these credentials in an encrypted database (sometimes called a vault) that nobody can access without the master password. This prevents users from needing to remember multiple passwords: they only have to remember one password to retrieve all others from the vault. Password managers can also generate passwords for users struggling to come up with complex passwords for different accounts on their own. Password hygiene is a big concern for enterprises. According to the <a href="https://www.verizon.com/business/resources/reports/dbir/" rel="noopener" title="Opens a new window" target="_blank"><em>2024 Verizon Data Breach Investigation</em><span class="external-link-icon">Opens a new window <em class="fas fa-external-link-alt" aria-hidden="true"></em></span></a> report, 68% of data breaches included a human element. </span></p> <p><strong>Further Reading: </strong><a href="https://www.spiceworks.com/it-security/identity-access-management/articles/what-is-password-management/"><span style="font-weight: 400">What Is Password Management?</span></a></p> <h3>23. Penetration Testing</h3> <p><span style="font-weight: 400">Penetration testing or pen testing is a type of ethical hacking which allows security teams to identify exploitable vulnerabilities in the company’s resources or network by simulating a cyberattack. The objective is to trace the attack paths threat actors use to carry out a cyberattack. This helps in managing associated risks. However, your security team should not run penetration tests during business hours to ensure the test doesn’t impact operations. </span></p> <p><strong>Further Reading: </strong><a href="https://www.spiceworks.com/it-security/vulnerability-management/articles/what-is-penetration-testing/"><span style="font-weight: 400">What Is Penetration Testing?</span></a></p> <h3>24. Threat Modeling</h3> <p><span style="font-weight: 400">Threat modeling identifies vulnerabilities and improves an application’s security at the earliest development stages. A good threat modeling tool suggests strategies for mitigating vulnerabilities, which developers can incorporate into the application development life cycle. While effective, threat modeling can take time and investment due to scale of your organization and the number of stakeholders involved. </span></p> <p><strong>Further Reading: </strong><a href="https://www.spiceworks.com/it-security/network-security/articles/what-is-threat-modeling-definition-process-examples-and-best-practices/"><span style="font-weight: 400">What Is Threat Modeling?</span></a></p> <h3>25. Zero Trust Network Access (ZTNA)</h3> <p><span style="font-weight: 400">Zero trust network access (ZTNA) has emerged as the go-to model for many organizations in the face of rising cyberattacks. The strategy adopts a holistic approach to security, operating on the premise that one cannot trust any individual or device. Zero trust requires organizations to implement strict identity verification for every worker and device trying to access their database on a private network, even if they are located inside the network perimeter. Even if an attacker infiltrates a network, they will not have free access to the resources. Shifting to a zero trust network does not require your organization to invest in new hardware and your IT team can likely implement the strategy using your company’s existing infrastructure. </span></p> <p><strong>Further Reading:</strong> <a href="https://www.spiceworks.com/it-security/network-security/articles/zero-trust-security/"><span style="font-weight: 400">What Is Zero Trust Security?</span></a></p> <figure class="article-thumbnail"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-3179593" src="https://images.spiceworks.com/wp-content/uploads/2024/10/02165357/ZeroTrustStrategy.png" alt="Security Terms - Zero Trust - In 2023, Okta found 61% of organizations use ZTNA" width="561" height="240"></figure> <h3>MORE ON CYBERSECURITY AWARENESS</h3> <ul> <li><a href="https://www.spiceworks.com/it-security/cyber-risk-management/interviews/cybersecurity-awareness-training-tips-to-raise-the-bar-security/">6 Tips To Raise the Bar on Cybersecurity Awareness</a></li> <li><a href="https://www.spiceworks.com/it-security/cyber-risk-management/guest-article/importance-of-cybersecurity-awareness/">Importance of Cybersecurity Awareness for Everyone</a></li> <li><a href="https://www.spiceworks.com/it-security/vulnerability-management/guest-article/5-ways-to-get-users-thinking-about-cybersecurity/">5 Ways to Get Users Thinking About Cybersecurity</a></li> </ul> </body></html> </div> <div id="description_fr" class="gp-entry-text" style="display: none;"> </div> <div id="description_de" class="gp-entry-text" style="display: none;"> </div> </div> <!-- --> <div class="article-tags"> <div class="tag-listing"> <!-- --> <a href="https://www.spiceworks.com/tags/cybersecurity/"> Cybersecurity </a> <a href="https://www.spiceworks.com/tags/malware/"> Malware </a> <a href="https://www.spiceworks.com/tags/phishing/"> Phishing </a> <a href="https://www.spiceworks.com/tags/ransomware/"> Ransomware </a> </div> </div> <div class="social-share-bottom"> <h4 class="share-title">Share This Article:</h4> <div class="mo-openid-app-icons circle "><p style="margin-top:4% !important; margin-bottom:0px !important; color:#000000"></p><div class='horizontal'><a rel='nofollow' title='facebook' onclick='popupCenter("https://www.facebook.com/sharer/sharer.php?u=https://www.spiceworks.com/it-security/security-general/articles/important-cybersecurity-terms/&src=sdkpreparse", 800, 500);' class='mo-openid-share-link' style='margin-left : -2px !important'><i class=' square fab fa-facebook' style='padding-top:4px;text-align:center;color:#76797A;font-size:36px !important;height:36px !important;width:36px !important;'></i></a><a rel='nofollow' title='twitter' onclick='popupCenter("https://twitter.com/intent/tweet?text=25 Security Terms You Should Know for Cybersecurity Awareness Month&url=https://www.spiceworks.com/it-security/security-general/articles/important-cybersecurity-terms/", 800, 500);' class='mo-openid-share-link' style='margin-left : -2px !important'><i class=' square fab fa-twitter' style='padding-top:4px;text-align:center;color:#76797A;font-size:36px !important;height:36px !important;width:36px !important;'></i></a><a rel='nofollow' title='linkedin' onclick='popupCenter("https://www.linkedin.com/shareArticle?mini=true&title=25 Security Terms You Should Know for Cybersecurity Awareness Month&url=https://www.spiceworks.com/it-security/security-general/articles/important-cybersecurity-terms/&summary=", 800, 500);' class='mo-openid-share-link' style='margin-left : -2px !important'><i class=' square fab fa-linkedin' style='padding-top:4px;text-align:center;color:#76797A;font-size:36px !important;height:36px !important;width:36px !important;'></i></a></div></p></div><br/><script>function popupCenter(pageURL, w,h) {var left = (screen.width/2)-(w/2);var top = (screen.height/2)-(h/2);var targetWin = window.open (pageURL, '_blank','toolbar=no, location=no, directories=no, status=no, menubar=no, scrollbars=no, resizable=no, copyhistory=no, width='+w+', height='+h+', top='+top+', left='+left);}function pinIt(){var e = document.createElement("script");e.setAttribute('type','text/javascript');e.setAttribute('charset','UTF-8');e.setAttribute('src','https://assets.pinterest.com/js/pinmarklet.js?r='+Math.random()*99999999); document.body.appendChild(e);}</script> </div> <script> jQuery(document).ready(function() { // For the top social share icons jQuery('.social-share-icons .mo-openid-share-link[title="facebook"]').addClass('content-page-social-facebook-top'); jQuery('.social-share-icons .mo-openid-share-link[title="twitter"]').addClass('content-page-social-x-top'); jQuery('.social-share-icons .mo-openid-share-link[title="linkedin"]').addClass('content-page-social-linkedin-top'); // For the bottom social share icons jQuery('.social-share-bottom .mo-openid-share-link[title="facebook"]').addClass('content-page-social-facebook-bottom'); jQuery('.social-share-bottom .mo-openid-share-link[title="twitter"]').addClass('content-page-social-x-bottom'); jQuery('.social-share-bottom .mo-openid-share-link[title="linkedin"]').addClass('content-page-social-linkedin-bottom'); }); </script> <style type="text/css"> .social-share-bottom{padding-bottom: 40px} </style> <div class="gp-author-info"> <img src= "https://images.spiceworks.com/wp-content/uploads/2021/06/03053736/Mugshot-150x150.jpg" alt="Abhijit Ahaskar" class="avatar avatar-110 wp-user-avatar wp-user-avatar-110 alignnone photo" width="115" height="115"> <div class="gp-author-meta"> <div class="gp-author-name f-left"> <a href="https://www.spiceworks.com/user/about/abhijit-ahaskar/" data-cms-ai="0"> Abhijit Ahaskar </a> <p class="em-company-name"> </p> </div> <div class="f-right for-desktop"> <a target="_blank" href="https://twitter.com/abhijitahaskar?lang=en" rel="nofollow" title="View Author profile on Twitter"><i class="fa fa-twitter" aria-hidden="true"></i></a> <a target="_blank" href="https://www.linkedin.com/in/abhijit-ahaskar-a0934a2b/" rel="nofollow" title="View Author profile on Linkedin"><i class="fa fa-linkedin" aria-hidden="true"></i></a> </div> </div> <div class="gp-author-desc full-width"> <div class="f-right for-mobile row"> <a target="_blank" href="https://twitter.com/abhijitahaskar?lang=en" rel="nofollow" title="View Author profile on Twitter"><i class="fa fa-twitter" aria-hidden="true"></i></a> <a target="_blank" href="https://www.linkedin.com/in/abhijit-ahaskar-a0934a2b/" rel="nofollow" title="View Author profile on Linkedin"><i class="fa fa-linkedin" aria-hidden="true"></i></a> </div><div class="mobile-space"></div> Abhijit Ahaskar is an Assistant Editor at Toolbox. He has over 11 years of experience covering B2B technologies, including cybersecurity, automation, AI, IoT and cloud computing. He has previously worked at Mint, PCQuest and MyMobile. You can get in touch with him at <a href="mailto:abhijit.ahaskar@swzd.com" rel="noopener noreferrer"> abhijit.ahaskar@swzd.com</a> </div> <!-- <a href="#"> <button class="take-me-btn"> Read More</button> </a> --> </div> <div class="gp-author-info"> <img src= "https://images.spiceworks.com/wp-content/uploads/2024/03/28214600/NancySimeone-150x150.png" alt="Nancy Simeone" class="avatar avatar-110 wp-user-avatar wp-user-avatar-110 alignnone photo" width="115" height="115"> <div class="gp-author-meta"> <div class="gp-author-name f-left"> <a href="https://www.spiceworks.com/user/about/nancy/" data-cms-ai="0">Nancy Simeone</a> <p class="em-company-name"> </p> </div> <div class="f-right for-desktop"> <a target="_blank" href="https://x.com/100indecisions" rel="nofollow" title="View Author profile on Twitter"><span class="sr-text external-link-icon"> opens a new window</span><i class="fa fa-twitter" aria-hidden="true"></i></a> <a target="_blank" href="https://www.linkedin.com/in/nancysimeone/" rel="nofollow" title="View Author profile on Linkedin"><span class="sr-text external-link-icon"> opens a new window</span><i class="fa fa-linkedin" aria-hidden="true"></i></a> </div> </div> <div class="gp-author-desc full-width"> <div class="f-right for-mobile row"> <a target="_blank" href="https://x.com/100indecisions" title="View Author profile on Twitter" rel="nofollow"><span class="sr-text external-link-icon"> opens a new window</span><i class="fa fa-twitter" aria-hidden="true"></i></a> <a target="_blank" href="https://www.linkedin.com/in/nancysimeone/" title="View Author profile on Linkedin" rel="nofollow"><span class="sr-text external-link-icon"> opens a new window</span><i class="fa fa-linkedin" aria-hidden="true"></i></a> </div><div class="mobile-space"></div> Nancy Simeone is an experienced digital marketer who embraces the challenge of finding insights hidden within endless streams of data. She attained her journalism degree just as "the Internet" was becoming mainstream and has enjoyed growing, evolving, and maturing with the platform formerly known as "new media." When she's not acting as Managing Editor of Spiceworks News & Insights, you can probably find her lost in an internet rabbit hole. </div> <!-- <a href="#"> <button class="take-me-btn">Read More</button> </a> --> </div> <div class="row take-me-to-community"> <div class="col-md-2 col-sm-2"> <img src="https://www.spiceworks.com/wp-content/uploads/2022/03/spot-illustration.png" alt="Take me to Community" width="100" height="101"> </div> <div class="col-md-10 col-sm-10"> <span> Do you still have questions? Head over to the Spiceworks Community to find answers. </span><br> <a class="content-page-take-me-to-community-button" href="https://community.spiceworks.com/"> <button class="take-me-btn" id="topic footer|Take me to the Community">Take me to Community</button> </a> </div> </div> <!--<div class="login-1"> <h3></h3> <p></p> <form name="loginform1" class="gp-login-form1" action="" method="post"> <div class="gp-login-content1"> <div class="gp-social-login1"> <div class="gp-social-login2"> <a rel="nofollow" class="mo_btn mo_btn-mo mo_btn-block mo_btn-social mo_btn-custom-dec login-button email-sign-in" id="refresh" href="#EmailSignUp"> <svg class="email-svg" width="22" height="17" viewBox="0 0 22 17" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M20.5533 1C20.4625 0.99064 20.3709 0.99064 20.28 1H1.61334C1.49371 1.00185 1.37486 1.01979 1.26001 1.05334L10.8933 10.6467L20.5533 1Z" fill="#0077B5"/> <path d="M21.54 1.92667L11.8333 11.5933C11.5835 11.8417 11.2455 11.9811 10.8933 11.9811C10.541 11.9811 10.2031 11.8417 9.95329 11.5933L0.333288 2C0.303714 2.10869 0.288034 2.2207 0.286621 2.33333V15.6667C0.286621 16.0203 0.427097 16.3594 0.677145 16.6095C0.927194 16.8595 1.26633 17 1.61995 17H20.2866C20.6402 17 20.9794 16.8595 21.2294 16.6095C21.4795 16.3594 21.62 16.0203 21.62 15.6667V2.33333C21.6146 2.19444 21.5877 2.05722 21.54 1.92667ZM2.53329 15.6667H1.60662V14.7133L6.45329 9.90667L7.39329 10.8467L2.53329 15.6667ZM20.2733 15.6667H19.34L14.48 10.8467L15.42 9.90667L20.2666 14.7133L20.2733 15.6667Z" fill="#0077B5"/> </svg> <div class="space-p1" onclick="openSignUp(), ga('send', 'event', 'sign up', 'click', 'topic footer|signup|email', 'topic-footer-signup-email');">Sign up with Email</div> </a> </div> </div> </div> <style type="text/css"> .hideSignIn{ display: none!important; } </style> </form> </div> </div>--> <div class="col-md-12 table-of-content nopadding" style="position:fixed!important; width: 834px!important;"></div> </article> </div> <div class="col-md-12 col-sm-12 for-tablets"> <div style="margin-top: 20px" class="centerthe1"> <div data-pogo="footer"></div> </div> </div> <div class="col-md-4 col-sm-4 article-sidebar"> <aside role="complementary"> <style type="text/css"> .left-content-home{top: 20px !important;} .i-amphtml-layout-size-defined .i-amphtml-fill-content{margin-top: 30px !important} </style> <div class="adcode-sidebar-one article-mobile-ads"> <div data-pogo="sidebar"></div> </div> <style> @media only screen and (min-device-width: 820px) and (max-device-width: 1180px) and (-webkit-min-device-pixel-ratio: 1) and (orientation: portrait) { .popular-section{margin-top:280px!important} } @media only screen and (min-device-width: 1024px) and (max-device-width: 1366px) and (-webkit-min-device-pixel-ratio: 1) and (orientation: portrait) { .popular-section{margin-top:320px!important} } .survey-option span {background: #007FA2;width: 100%;padding: 9px 12px;border-radius: 3px;} </style> <div class="survey-option"> <div class="survey-img"> <a href="https://www.spiceworks.com/spiceworld/" target="_blank"> <img src="https://images.spiceworks.com/wp-content/uploads/2024/10/01200816/SW24_NIPage_800x500_V2.jpg" data-src="https://images.spiceworks.com/wp-content/uploads/2024/10/01200816/SW24_NIPage_800x500_V2.jpg" class="" alt="Survey Image" data-size="Promo" style="" width="100%"> </a> </div> <div class="survey-text"> <p><strong>Join us at SpiceWorld</strong><br> Level up your IT game at our premier conference where IT pros and industry experts come together.</p> <a class="take-survey-btn" id="survey-btn" href="https://www.spiceworks.com/spiceworld/" target="_blank"> <button>Save your spot now</button> </a> </div> </div> <style>.feedc{color:black !important;}.coc{color: #007FA2!important; border: 1px solid; padding: 10px; border-radius:5px; margin-bottom:10px;}</style> <div class="popular-section"><div class="popular-section-h5">Spiceworks Community</div><div class="left-content-home"> <div class="content-description"> <div class="MixedUseItem-content"> <div class="MixedUseItem-headline popular-list" style="padding-bottom:8px;margin-bottom:8px;"><p><a class="feedlink0" href="https://community.spiceworks.com/t/did-you-know-most-it-pros-say-public-speaking-skills-are-important-for-a-career-in-tech/1144931" title="Did you know most IT pros say public speaking skills are important for a career in tech?" target="_blank">Did you know most IT pros say public speaking skills are important for a career in tech?</a></p><div class="feedc"> According to a quote attributed to Mark Twain, “There are two types of speakers: those that are nervous and those that are liars.” Bu...</div></div> </div> </div> </div><div class="left-content-home"> <div class="content-description"> <div class="MixedUseItem-content"> <div class="MixedUseItem-headline popular-list" style="padding-bottom:8px;margin-bottom:8px;"><p><a class="feedlink1" href="https://community.spiceworks.com/t/snap-mini-moon-farewell-scraping-word-for-ai-isps-and-media-piracy/1146865" title="Snap! -- Mini Moon Farewell, Scraping Word for AI, ISPs and Media Piracy" target="_blank">Snap! -- Mini Moon Farewell, Scraping Word for AI, ISPs and Media Piracy</a></p><div class="feedc"> Welcome to today’s edition of the Spiceworks Snap! It’s your daily dose of security and tech news, in brief, along with a mix of othe...</div></div> </div> </div> </div><div class="left-content-home"> <div class="content-description"> <div class="MixedUseItem-content"> <div class="MixedUseItem-headline popular-list" style="padding-bottom:8px;margin-bottom:8px;"><p><a class="feedlink2" href="https://community.spiceworks.com/t/veeam-b-r-update-broke-all-my-backups-help/1146537" title="Veeam b&r update broke all my backups! help!" target="_blank">Veeam b&r update broke all my backups! help!</a></p><div class="feedc"> Help please! I cant’ figure out what happened… I had my backups running for weeks with no issues, and then an update came and it all ...</div></div> </div> </div> </div><br><a class="coc" href="https://community.spiceworks.com" target="_blank"> Check out the Community</a><br><br></div> <div class="popular-section"> <div class="popular-section-h5">Popular Articles</div> <div class="left-content-home"> <div class="content-description"> <div class="MixedUseItem-content"> <div class="MixedUseItem-headline popular-list"> <a class="content-page-popular-article-0" href="https://www.spiceworks.com/it-security/endpoint-security/articles/what-is-xdr/" rel="bookmark" title="What Is Extended Detection and Response (XDR)? Definition, Components, Advantages, and Best Practices">What Is Extended Detection and Response (XDR)? Definition, Components, Advantages, and Best Practices </a> </div> </div> </div> </div> <div class="left-content-home"> <div class="content-description"> <div class="MixedUseItem-content"> <div class="MixedUseItem-headline popular-list"> <a class="content-page-popular-article-1" href="https://www.spiceworks.com/it-security/cyber-risk-management/articles/social-engineering-still-rampant/" rel="bookmark" title="What Is Social Engineering and Why Does it Work?">What Is Social Engineering and Why Does it Work? </a> </div> </div> </div> </div> <div class="left-content-home"> <div class="content-description"> <div class="MixedUseItem-content"> <div class="MixedUseItem-headline popular-list"> <a class="content-page-popular-article-2" href="https://www.spiceworks.com/it-security/vulnerability-management/articles/what-is-threat-hunting/" rel="bookmark" title="Threat Hunting: What Is It and Why Is It Necessary">Threat Hunting: What Is It and Why Is It Necessary </a> </div> </div> </div> </div> </div> <div class="adcode-sidebar-two"> <script type="text/javascript"> $stick = $('.adcode-sidebar-two'); jQuery(function($) { function fixDiv() { var $cache = $('#sidebar-bottom-ad'); if ($(window).scrollTop() > $stick.offset().top) $cache.css({ 'position': 'fixed', 'top': '30px', 'padding': '0px 20px 0px 0px', 'margin': '0px 0px 0px 0px' }); else $cache.css({ 'position': 'static', 'padding': '30px 0px 0px 0px', 'margin': '0px 0px 0px 0px' }); } $(window).scroll(fixDiv); fixDiv(); }); </script> <div data-pogo="sidebar" id="sidebar-bottom-ad"></div> </div> </aside> </div> </div> <div class="col-md-12 col-sm-12"> <div style="margin-top: 20px" class="centerthe1"> <div data-pogo="footer"></div> </div> </div> </div> </div> <!-- start Recommended Reads section --> <div class="new_recommended_reads"> <div class="r-reads-footer gp-container gp-container-1"> <div id="gp-content-footer"> <h2>Recommended Reads</h2> <div class="r-read-main"> <div class="r-read-list"> <div class="r-read-list-inner"> <div class="r-reads-thum"> <a class="content-page-recommended-article-0" href="https://www.spiceworks.com/it-security/security-general/articles/black-hat-2024-ai-in-security-microsoft-vulnerabilities-and-more/"> <img src="https://images.spiceworks.com/400x200/wp-content/uploads/2024/08/09164948/Black-Hat-2024.jpg" data-src="https://images.spiceworks.com/400x200/wp-content/uploads/2024/08/09164948/Black-Hat-2024.jpg" class=" lazyloaded" title="AI in Security, Microsoft Vulnerabilities, and More: Key Takeaways From Black Hat USA 2024" alt="AI in Security, Microsoft Vulnerabilities, and More: Key Takeaways From Black Hat USA 2024" data-size=""> </a> </div> <div class="show-category"> <a class="content-page-recommended-article-topic-0" href="https://www.spiceworks.com/it-security/security-general/" rel="dofollow" data-cms-ai="0"> Security General </a> </div> <div class="r-reads-title"> <h3> <a class="content-page-recommended-article-0" href="https://www.spiceworks.com/it-security/security-general/articles/black-hat-2024-ai-in-security-microsoft-vulnerabilities-and-more/" rel="bookmark" title="AI in Security, Microsoft Vulnerabilities, and More: Key Takeaways From Black Hat USA 2024"> AI in Security, Microsoft Vulnerabilities, and More: Key Takeaways From Black Hat USA 2024 </a> </h3> </div> </div> </div> <div class="r-read-list"> <div class="r-read-list-inner"> <div class="r-reads-thum"> <a class="content-page-recommended-article-1" href="https://www.spiceworks.com/tech/tech-general/news/google-chrome-updates-android-ios-desktop/"> <img src="https://images.spiceworks.com/400x200/wp-content/uploads/2024/08/09123853/Shutterstock_1691146054.jpg" data-src="https://images.spiceworks.com/400x200/wp-content/uploads/2024/08/09123853/Shutterstock_1691146054.jpg" class=" lazyloaded" title="Google Releases Chrome Beta Updates for Android, iOS" alt="Google Releases Chrome Beta Updates for Android, iOS" data-size=""> </a> </div> <div class="show-category"> <a class="content-page-recommended-article-topic-1" href="https://www.spiceworks.com/tech/tech-general/" rel="dofollow" data-cms-ai="0"> Tech General </a> </div> <div class="r-reads-title"> <h3> <a class="content-page-recommended-article-1" href="https://www.spiceworks.com/tech/tech-general/news/google-chrome-updates-android-ios-desktop/" rel="bookmark" title="Google Releases Chrome Beta Updates for Android, iOS"> Google Releases Chrome Beta Updates for Android, iOS </a> </h3> </div> </div> </div> <div class="r-read-list"> <div class="r-read-list-inner"> <div class="r-reads-thum"> <a class="content-page-recommended-article-2" href="https://www.spiceworks.com/tech/networking/articles/access-control-lists/"> <img src="https://images.spiceworks.com/400x250/wp-content/uploads/2024/07/29040110/Access-control-list.jpg" data-src="https://images.spiceworks.com/400x250/wp-content/uploads/2024/07/29040110/Access-control-list.jpg" class=" lazyloaded" title="What Are Access Control Lists? Definition, Working, Types, Best Practices, and Importance" alt="What Are Access Control Lists? Definition, Working, Types, Best Practices, and Importance" data-size=""> </a> </div> <div class="show-category"> <a class="content-page-recommended-article-topic-2" href="https://www.spiceworks.com/tech/networking/" rel="dofollow" data-cms-ai="0"> Networking </a> </div> <div class="r-reads-title"> <h3> <a class="content-page-recommended-article-2" href="https://www.spiceworks.com/tech/networking/articles/access-control-lists/" rel="bookmark" title="What Are Access Control Lists? Definition, Working, Types, Best Practices, and Importance"> What Are Access Control Lists? Definition, Working, Types, Best Practices, and Importance </a> </h3> </div> </div> </div> <div class="r-read-list"> <div class="r-read-list-inner"> <div class="r-reads-thum"> <a class="content-page-recommended-article-3" href="https://www.spiceworks.com/it-security/security-general/news/mimecast-acquires-code42/"> <img src="https://images.spiceworks.com/400x200/wp-content/uploads/2024/07/26165113/Acquisition.jpg" data-src="https://images.spiceworks.com/400x200/wp-content/uploads/2024/07/26165113/Acquisition.jpg" class=" lazyloaded" title="Mimecast Acquires Code42" alt="Mimecast Acquires Code42" data-size=""> </a> </div> <div class="show-category"> <a class="content-page-recommended-article-topic-3" href="https://www.spiceworks.com/it-security/security-general/" rel="dofollow" data-cms-ai="0"> Security General </a> </div> <div class="r-reads-title"> <h3> <a class="content-page-recommended-article-3" href="https://www.spiceworks.com/it-security/security-general/news/mimecast-acquires-code42/" rel="bookmark" title="Mimecast Acquires Code42"> Mimecast Acquires Code42 </a> </h3> </div> </div> </div> <div class="r-read-list"> <div class="r-read-list-inner"> <div class="r-reads-thum"> <a class="content-page-recommended-article-4" href="https://www.spiceworks.com/it-security/security-general/news/uk-authorities-arrest-hacker-scattered-spider-group-mgm-attack/"> <img src="https://images.spiceworks.com/400x200/wp-content/uploads/2023/07/31103215/Shutterstock_1346380844.jpg" data-src="https://images.spiceworks.com/400x200/wp-content/uploads/2023/07/31103215/Shutterstock_1346380844.jpg" class=" lazyloaded" title="UK Authorities Arrest Suspected Hacker in the Scattered Spider Group Linked to MGM Attack" alt="UK Authorities Arrest Suspected Hacker in the Scattered Spider Group Linked to MGM Attack" data-size=""> </a> </div> <div class="show-category"> <a class="content-page-recommended-article-topic-4" href="https://www.spiceworks.com/it-security/security-general/" rel="dofollow" data-cms-ai="0"> Security General </a> </div> <div class="r-reads-title"> <h3> <a class="content-page-recommended-article-4" href="https://www.spiceworks.com/it-security/security-general/news/uk-authorities-arrest-hacker-scattered-spider-group-mgm-attack/" rel="bookmark" title="UK Authorities Arrest Suspected Hacker in the Scattered Spider Group Linked to MGM Attack"> UK Authorities Arrest Suspected Hacker in the Scattered Spider Group Linked to MGM Attack </a> </h3> </div> </div> </div> <div class="r-read-list"> <div class="r-read-list-inner"> <div class="r-reads-thum"> <a class="content-page-recommended-article-5" href="https://www.spiceworks.com/it-security/security-general/articles/what-is-acceptable-use-policy/"> <img src="https://images.spiceworks.com/400x200/wp-content/uploads/2024/07/23033048/acceptable-use-policy.jpg" data-src="https://images.spiceworks.com/400x200/wp-content/uploads/2024/07/23033048/acceptable-use-policy.jpg" class=" lazyloaded" title="What Is Acceptable Use Policy (AUP)? Definition, Elements, Importance, Examples, and Best Practices" alt="What Is Acceptable Use Policy (AUP)? Definition, Elements, Importance, Examples, and Best Practices" data-size=""> </a> </div> <div class="show-category"> <a class="content-page-recommended-article-topic-5" href="https://www.spiceworks.com/it-security/security-general/" rel="dofollow" data-cms-ai="0"> Security General </a> </div> <div class="r-reads-title"> <h3> <a class="content-page-recommended-article-5" href="https://www.spiceworks.com/it-security/security-general/articles/what-is-acceptable-use-policy/" rel="bookmark" title="What Is Acceptable Use Policy (AUP)? Definition, Elements, Importance, Examples, and Best Practices"> What Is Acceptable Use Policy (AUP)? Definition, Elements, Importance, Examples, and Best Practices </a> </h3> </div> </div> </div> </div> </div> </div> </div> <!-- end Recommended Reads section --> </div> </div> </main> <script> jQuery(document).ready(function(){ var submitIcon = jQuery('.searchbox-icon'); var inputBox = jQuery('.searchbox-input'); var searchBox = jQuery('.searchbox'); var isOpen = false; submitIcon.click(function(){ if(isOpen == false){ searchBox.addClass('searchbox-open'); inputBox.focus(); isOpen = true; } else { searchBox.removeClass('searchbox-open'); inputBox.focusout(); isOpen = false; } }); submitIcon.mouseup(function(){ return false; }); searchBox.mouseup(function(){ return false; }); jQuery(document).mouseup(function(){ if(isOpen == true){ jQuery('.searchbox-icon').css('display','block'); submitIcon.click(); } }); }); function buttonUp(){ var inputVal = jQuery('.searchbox-input').val(); inputVal = $.trim(inputVal).length; if( inputVal !== 0){ jQuery('.searchbox-icon').css('display','none'); } else { jQuery('.searchbox-input').val(''); jQuery('.searchbox-icon').css('display','block'); } } jQuery(document).ready(function() { jQuery('.searchBox-clear-q button, .search-results-form .searchBox-clear').keypress(function(event) { if (event.keyCode === 13) { jQuery(this).click(); } }); jQuery('.lean-navbar-drawer .search-wrapper label.search-icon input, .search-results-form .search-icon input').on('focus', function(){ jQuery('.fa-search').addClass('focus'); }); jQuery('.lean-navbar-drawer .search-wrapper label.search-icon input, .search-results-form .search-icon input').on('focusout', function(){ jQuery('.fa-search').removeClass('focus'); }); jQuery(".search-box-results .search-box-results-entry:last-child").focusout(function(){ jQuery('.search-box-results').hide(); }); }); </script> <footer id="footer-main" data-footer="site-footer" class="site-footer" role="contentinfo"> <div class="site-footer--auxiliary"> <div id="block-4" class="widget widget_block"><a data-text="spiceworks-logo" class="site-footer_link site-footer_brand" href="https://www.spiceworks.com/"><span class="external-link-icon">spiceworks.</span></a></div> <ul class="site-footer_menu site-footer_menu--auxiliary-links"> <li id="menu-item-3176771" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-3176771 site-footer_menu-item"><a href="https://www.spiceworks.com/about/" class="site-footer_link">About</a></li> <li id="menu-item-3176772" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-3176772 site-footer_menu-item"><a href="https://www.spiceworks.com/contact/" class="site-footer_link">Contact</a></li> <li id="menu-item-3176773" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-3176773 site-footer_menu-item"><a target="_blank" rel="noopener" href="https://community.spiceworks.com/c/spiceworks-support/34/" class="site-footer_link">Support</a></li> <li id="menu-item-3176774" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-3176774 site-footer_menu-item"><a target="_blank" rel="noopener" href="https://swzd.com/" class="site-footer_link">Advertise</a></li> <li id="menu-item-3176776" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-3176776 site-footer_menu-item"><a href="https://www.spiceworks.com/press/" class="site-footer_link">Press / Media</a></li> <li id="menu-item-3176777" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-3176777 site-footer_menu-item"><a target="_blank" rel="noopener" href="https://swzd.com/careers/" class="site-footer_link">Careers</a></li> <li id="menu-item-3176778" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-3176778 site-footer_menu-item"><a href="https://www.spiceworks.com/spiceworld/" class="site-footer_link">SpiceWorld</a></li> <li id="menu-item-3176780" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-3176780 site-footer_menu-item"><a href="https://www.spiceworks.com/about-editorial/" class="site-footer_link">About Editorial</a></li> <li class="site-footer_menu-item site-footer_menu-item--social-links"> <!--<ul class="site-footer_menu site-footer_menu--social-links">--> <div id="block-5" class="widget widget_block"><ul class="site-footer_menu site-footer_menu--social-links"> <li class="site-footer_menu-item site-footer_menu-item--social-facebook"><a data-text="social-facebook" class="site-footer_link " href="https://www.facebook.com/Spiceworks/" rel="dofollow" title="Follow on facebook"><span class="external-link-icon">Follow on Facebook</span></a></li><li class="site-footer_menu-item site-footer_menu-item--social-twitter"><a data-text="social-twitter" class="site-footer_link " href="https://twitter.com/Spiceworks/" rel="dofollow" title="Follow on twitter"> <svg viewBox="0 0 24 24" aria-hidden="true" class="r-4qtqp9 r-yyyyoo r-dnmrzs r-bnwqim r-1plcrui r-lrvibr r-18jsvk2 r-rxcuwo r-1777fci r-m327ed r-494qqr"><g><path d="M18.244 2.25h3.308l-7.227 8.26 8.502 11.24H16.17l-5.214-6.817L4.99 21.75H1.68l7.73-8.835L1.254 2.25H8.08l4.713 6.231zm-1.161 17.52h1.833L7.084 4.126H5.117z"></path></g></svg> </a></li><li class="site-footer_menu-item site-footer_menu-item--social-linkedin"><a data-text="social-linkedin" class="site-footer_link " href="https://www.linkedin.com/company/spiceworks/" rel="dofollow" title="Follow on linkedin"><span class="external-link-icon">Follow on Linkedin</span></a></li><li class="edfm-icon-youtube rss site-footer_menu-item site-footer_menu-item--social"><a class="site-footer_link " rel="dofollow" href="https://www.youtube.com/@spiceworks/" data-text="social-youtube" title="Follow on youtube"><i class="fa fa-youtube" style="margin:7px 0px 0px 9px"></i></a></li><li class="edfm-icon-linkedin rss site-footer_menu-item site-footer_menu-item--social"><a class="site-footer_link " href="https://www.spiceworks.com/rss-feeds/" data-text="social-rss" rel="dofollow" title="RSS feed"><i class="fa fa-rss" style="margin:7px 0px 0px 9px"></i></a></li> </ul></div> <!--</ul>--> </li> </ul> <ul class="site-footer_menu site-footer_menu--legal"> <li id="menu-item-3176781" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-3176781 site-footer_menu-item"><a href="https://www.spiceworks.com/sitemap/" class="site-footer_link">Sitemap</a></li> <li id="menu-item-3176782" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-3176782 site-footer_menu-item"><a rel="privacy-policy" href="https://www.spiceworks.com/privacy/" class="site-footer_link">Privacy Policy</a></li> <li id="menu-item-3176783" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-3176783 site-footer_menu-item"><a target="_blank" rel="noopener" href="https://www.ziffdavis.com/terms-of-use" class="site-footer_link">Terms of Use</a></li> <li id="menu-item-3176784" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-3176784 site-footer_menu-item"><a href="https://www.spiceworks.com/privacy/cookies/" class="site-footer_link">Cookie Policy</a></li> <li id="menu-item-3176785" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-3176785 site-footer_menu-item"><a target="_blank" rel="noopener" href="https://community.spiceworks.com/faq" class="site-footer_link">Guidelines</a></li> <li id="menu-item-3176786" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-3176786 site-footer_menu-item"><a href="https://www.spiceworks.com/accessibility-statement/" class="site-footer_link">Accessibility Statement</a></li> <li id="menu-item-3176787" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-3176787 site-footer_menu-item"><a target="_blank" rel="noopener" href="https://dsar.spiceworks.com/" class="site-footer_link">Do Not Sell my Personal Information</a></li> <li class="site-footer_menu-item site-footer_copyright"> <div id="block-3" class="widget widget_block widget_text"> <p>© Copyright 2006 - 2024 Spiceworks Inc.</p> </div> </li> </ul> </div> </footer> <!-- Schema & Structured Data For WP v1.36 - --> <script type="application/ld+json" class="saswp-schema-markup-output"> [{ "@context": "https://schema.org/", "@type": "Article", "@id": "https://www.spiceworks.com/it-security/security-general/articles/important-cybersecurity-terms/#Article", "url": "https://www.spiceworks.com/it-security/security-general/articles/important-cybersecurity-terms/", "inLanguage": "en-US", "mainEntityOfPage": "https://www.spiceworks.com/it-security/security-general/articles/important-cybersecurity-terms/", "headline": "25 Security Terms You Should Know", "description": "You'll hear these security terms a lot during Cybersecurity Awareness Month. Do you know what APT, DLP, or IAM mean?", "articleBody": "October is Cybersecurity Awareness Month, and most companies will host at least one workshop, training, or cybersecurity awareness webinar for their employees. Unfortunately, these sessions won't be very effective if your users don't understand the most commonly used security terms. The National Cybersecurity Alliance's Annual Cybersecurity Attitudes and Behaviors Report found that 53% of participants are always connected online. Some of your employees likely fall into that group. The same study also found that employees mainly believe the IT department (44%) and security department (44%) are responsible for the security of workplace information and that personal responsibility declined by 3%. Clearly, employers need to take a larger role in ensuring their employees understand the impact of poor cyber hygiene. As Jason Stirland, CTO of The Coaches' Voice, told Spiceworks in 2022, \"Cybersecurity Awareness Month is an ideal time to refresh employees with cybersecurity awareness training. After all, refreshing training ensures employees stay aware of new cybersecurity risks.\" Here are 25 security terms you'll hear at least once during Cybersecurity Awareness Month. Test your knowledge and be sure you know what they all mean. You never know when you'll have to explain them to a colleague, client, or relative. Security Terms - General Threats 1. Advanced Persistent Threat (APT) An advanced persistent threat (APT) is a form of cyberattack wherein an attacker uses advanced techniques to infiltrate a system or a network and stay undetected for as long as possible. The ultimate goal is to steal critical information over a long period. A lot of effort and resources are required to Since the effort required to carry out such an attack is high, APTs usually aim at high-value targets such as nation-states and large corporations. APT attackers are increasingly going after smaller companies that are part of larger organization’s supply chain networks. Smaller companies don’t have the cyber resources of large organizations and are usually poorly defended, which makes it easier to target them. Further Reading: What Is an Advanced Persistent Threat? | Everything You Need to Know About Advanced Persistent Threats (APTs) | 6 Tell-Tale Signs of APT Attacks 2. Distributed-Denial-of-Service (DDoS) A distributed denial-of-service (DDoS) attack disrupts a server, website or network by suddenly overwhelming it with large volumes of unexpected traffic it is unable to handle. One common way threat actors use to to carry out a DDoS attack is to first infect thousands of computer systems or IoT devices with malware. These devices are essentially \"robots\" under control of the threat actor, who uses the combined power of the systems to create a botnet. This botnet is then used to generate large amounts of traffic. DDoS attacks are sometimes also used as a distraction to carry out data theft or network infiltration. According to Imperva's 2024 DDoS Threat Landscape Report, the number of DDoS attacks year-over-year have increased at dramatic percentages for the gaming (208%), healthcare (236%) and telecommunications and ISP (548%) industries. Further Reading: What Is DDoS (Distributed Denial of Service)? | How to Stop the Rise of Weaponized IoT Botnets | Botnet Attacks - Examples and Prevention 3. Malware Malicious software that is purposely developed to damage, disrupt, or infiltrate electronics is referred to as malware. This type of software can also be used when a bad actor wants to open a gateway or backdoors in a system or network. These entrance points allow attackers to remotely plant other malicious software without requiring authentications from the user or system admin. Malware typically stays hidden and causes damage without the knowledge of the user. Further Reading: What Is Malware? | What Is Malware Removal? | Meet the Top 10 Nastiest Malware of 2020 4. Phishing Phishing is a widely used term in cybersecurity that describes an attempt to manipulate users into sharing personal or other credentials. These credentials can be used to hijack the victim's social media or banking accounts. When attackers use emails as the medium for these attacks, they are called phishing email attacks. These emails are deftly crafted so that they look genuine and pique the interest of the target. The objective is to get victims to believe that the email has been sent by a genuine person or an organization to get them to click on the malicious links or attachments and plant malware on their system. Further Reading: What Is a Phishing Email Attack? | Battling Phishing and Business Email Compromise Attacks | AI Phishing Is Code Red for Businesses 5. Ransomware Ransomware is a form of malware that uses encryption to block an organization’s access to their systems, files, databases, or applications until they agree to pay a ransom. The software is designed to spread across the network and target database and file servers and can quickly paralyze an entire organization and disrupt business operations. It is considered one of the most lucrative forms of cyberattacks as many organizations choose to pay the ransom to prevent losses incurred due to business disruption. Every year ransomware actors make billions of dollars through ransom payments. To put more pressure on organizations, some ransomware groups also steal critical data before encrypting it and then threaten to sell it on the dark web if the ransom isn’t paid. Further Reading: What Is a Ransomware Attack? | Ransomware: The Pros and Cons of Paying | The Evolution of Ransomware Tactics 6. Shadow IT Shadow IT refers to those applications, software, services, or devices that fall outside the purview of an organization’s IT team and have not been vetted and approved for use. Yet, such apps are widely used by business units and users. With the increase in cloud adoption, the use of shadow IT has also grown exponentially to plug the gaps left by company-approved applications. Due to a lack of visibility over shadow IT, IT teams cannot protect them from cyberattacks, putting the entire organization at risk. In 2021, research by 1Password found that more than half of respondents had created multiple accounts the IT department wasn't aware of, and almost 16% had created more than five accounts. Further Reading: Mitigating the Risks Posed by Shadow IT | How to Keep Data Safe in the Face of Growing Shadow IT | 7 Factors that Indicate You Have a Shadow IT Problem 7. Spyware Spyware is also a type of malware but is mostly used for surveillance. Instead of spreading across the network or stealing data, it remains hidden using advanced obfuscation techniques and quietly monitors every activity and communication on the target’s device. Spyware is widely used by criminals to attack high-profile corporate targets. According to a 2023 report from Google’s Threat Analysis Group and Mandiant, commercial surveillance vendors have essentially created a new industry out of selling spyware to take advantage of unpatched zero-day exploits. Further Reading: What Is Spyware? | Spyware: How to Spot an Infection | What Is a Trojan Horse? Security Terms - Tactics, Techniques, and Procedures 8. Social Engineering Social engineering is a set of tactics employed by cybercriminals to gather sensitive information from unsuspecting users. These tactics include background research, social media monitoring, fake customer care calls and sometimes in-person meetings. The motive behind most social engineering tricks is to carry out cyber theft and steal critical information or money. In many instances, attackers use social engineering to target senior-level executives and gain entry into company networks using credentials stolen from them. Further Reading: What Is Social Engineering? 9. Spear Phishing A subset of phishing, spear phishing attacks are a lot more sophisticated, organized, and dangerous. Before carrying out these attacks, threat actors use social engineering to identify corporate insiders who may have privileged access to their organization’s critical resources. Bad actors send emails that appear to be from legitimate contacts, like a supply chain partner, a customer, or a coworker. The emails appear relevant to the targeted employee's work, so the employee is more likely to react to the email by clicking on a malicious link. Further Reading: What Is a Spear Phishing Attack? 10. Whaling Also known as CEO fraud, whaling is a more targeted form of spear-phishing attack wherein attackers send a fake email in the name of the CEO or C-level executives to other important officials within the organization. The objective of the attack is to draw the victims to a hoax website and trick them into sharing sensitive information such as their login credentials. This information can then be used to steal money or to launch attacks on company networks. Further Reading: What Is Whaling? Security Terms - IT Defense Strategies 11. Biometric Authentication Biometric authentication is a widely-used method to verify the authenticity of an individual using their biological characteristics such as the face, iris, fingerprint or voice. Most modern-day devices such as smartphones or laptops offer some form of biometric security. With passwords becoming obsolete, enterprises are looking for new ways to secure access to their resources. Biometric security is more secure and reliable than passwords. Further Reading: What Is Biometric Authentication? 12. Browser Isolation Most organizations restrict what their employees can access on browsers on their company network or computer systems. This can be frustrating and even throttle productivity in some instances. Browser isolation is a method many organizations use to allow unrestricted web access to their employees without compromising on security. In this method, an employee’s internet activity is isolated from the larger computing environment in which they are operating. This is done by putting all traffic in a sandbox or a virtual machine (local isolation) or by hosting the browsing session on a remote server and streaming it to the user in real-time (remote isolation). Further Reading: What Is Browser Isolation? 13. Cloud Encryption With many businesses migrating to the cloud, securing workloads and databases is more critical than ever. Cloud encryption is one of the most effective methods that protect sensitive cloud data from attackers in case of a breach. In this method, mathematical algorithms encrypt all plain text data and transform into ciphertext, rendering it unreadable. Even if an unauthorized user obtains the information, no one can read the content without the decryption keys. Further Reading: What Is Cloud Encryption? 14. Container Security Container security is a broad term for a set of tools, policies, and processes designed to make a container more secure and resilient to attacks. With the growing use of containers, attacks on them have also increased. Though they are more secure than traditional virtual machines, they are not impenetrable. According to a Red Hat's 2024 State of Kubernetes security report nearly 9 in 10 organizations had at least 1 container incident in the previous 12 months. Further Reading: What Is Container Security? 15. Data Loss Prevention (DLP) As data volumes grow, managing and keeping track of data has become a lot more challenging. Loss of critical data can have severe repercussions for any organization. It can lead to loss of intellectual property, tarnish the brand image and invite heavy fines from data regulators. Many organizations are turning to data loss prevention (DLP) solutions to improve visibility over their data landscape. DLPs can mitigate the risk of data loss due to insider threats, negligence, external attacks, or natural disasters by ensuring that the organization has consistent access to all its data resources. Further Reading: What Is Data Loss Prevention (DLP)? 16. Firewall A firewall is a vital cog in a company’s security architecture. It monitors all incoming and outgoing network traffic as per the IT team’s instructions with the primary goal of allowing non-threatening traffic and keeping out all malicious traffic. A firewall creates a virtual wall between a private network and the public internet. More advanced firewalls come with in-built integrated intrusion prevention systems, enabling them to block malware and prevent application-layer attacks. Further Reading: What Is a Firewall? 17. Multi-Factor Authentication (MFA) Multi-factor authentication (MFA) is a key component of any organization’s identity and access management (IAM) strategy. It adds a layer of security over the sign-in process required to access cloud resources, web applications, or a virtual private network (VPN). It requires users to furnish two or more verification factors instead of relying only on the username and password for logging into a system. Studies show that this additional process reduces the risk of a cyber attack considerably. Passwords are the most common type of MFA factor organization use. You can share one-time passwords through email, SMS, or an authenticator tool like Google Authenticator, LastPass, or Okta Verify. Further Reading: What Is Multi-Factor Authentication? 18. Identity and Access Management (IAM) Identity and access management (IAM) tools verify the authenticity of requests made by individuals or devices to access systems. IAM solutions improve the IT team’s visibility into who has access to what and ensure that no one misuses access. In the shift to remote work, IAM gained prominence on IT agendas as employees started to request remote access to corporate resources - sometimes with their personal devices. Further Reading: What Is Identity and Access Management (IAM)? 19. Incident Response Incident response (IR) is the set of measures an organization takes to minimize the impact of a cyberattack. The measures include detection, analysis, containment, and recovery from a data breach. It also covers post-incident recovery activities such as feeding the information from the data breach to improve the incident response system and provide support to auditors. IR defines the roles and responsibilities of individuals and teams and details communication pathways between the incident response team and the rest of the organization. Further Reading: What Is Incident Response? 20. Network Access Control (NAC) Network access control (NAC) is a security solution that keeps unauthorized users and devices from an organization’s private network. As more people use personal devices to access corporate networks, keeping track of who has access to what becomes critical. NAC also makes sense for organizations with large-scale IoT deployments. NAC functions by restricting access to the company’s protected resources to specific users and devices and only to particular areas of the network. So, if a person or device has access to a corporate network, they will still not be able to access any internal resources due to NAC. Further Reading: What Is Network Access Control? 21. Privileged Access Management (PAM) A subset of IAM, privileged access management (PAM), is an infosec mechanism that helps organizations manage and secure privileged accounts with access to critical data and accounts. Unlike standard accounts, which have limited access to resources, privileged accounts, if compromised, can have serious repercussions for an organization. Google's August 2023 Threat Horizons Report found credential issues remain a challenge and account for over 60% of the factors in compromised cloud environments. Further Reading: What Is Privileged Access Management (PAM)? 22. Password Managers A password manager is an application that allows users to store and manage their login credentials and passwords. The application stores these credentials in an encrypted database (sometimes called a vault) that nobody can access without the master password. This prevents users from needing to remember multiple passwords: they only have to remember one password to retrieve all others from the vault. Password managers can also generate passwords for users struggling to come up with complex passwords for different accounts on their own. Password hygiene is a big concern for enterprises. According to the 2024 Verizon Data Breach Investigation report, 68% of data breaches included a human element. Further Reading: What Is Password Management? 23. Penetration Testing Penetration testing or pen testing is a type of ethical hacking which allows security teams to identify exploitable vulnerabilities in the company’s resources or network by simulating a cyberattack. The objective is to trace the attack paths threat actors use to carry out a cyberattack. This helps in managing associated risks. However, your security team should not run penetration tests during business hours to ensure the test doesn't impact operations. Further Reading: What Is Penetration Testing? 24. Threat Modeling Threat modeling identifies vulnerabilities and improves an application's security at the earliest development stages. A good threat modeling tool suggests strategies for mitigating vulnerabilities, which developers can incorporate into the application development life cycle. While effective, threat modeling can take time and investment due to scale of your organization and the number of stakeholders involved. Further Reading: What Is Threat Modeling? 25. Zero Trust Network Access (ZTNA) Zero trust network access (ZTNA) has emerged as the go-to model for many organizations in the face of rising cyberattacks. The strategy adopts a holistic approach to security, operating on the premise that one cannot trust any individual or device. Zero trust requires organizations to implement strict identity verification for every worker and device trying to access their database on a private network, even if they are located inside the network perimeter. Even if an attacker infiltrates a network, they will not have free access to the resources. Shifting to a zero trust network does not require your organization to invest in new hardware and your IT team can likely implement the strategy using your company's existing infrastructure. Further Reading: What Is Zero Trust Security? MORE ON CYBERSECURITY AWARENESS \t6 Tips To Raise the Bar on Cybersecurity Awareness \tImportance of Cybersecurity Awareness for Everyone \t5 Ways to Get Users Thinking About Cybersecurity", "keywords": "Cybersecurity, Malware, Phishing, Ransomware, ", "datePublished": "2024-10-02T20:17:47+00:00", "dateModified": "2024-10-02T20:16:22+00:00", "author": { "@type": "Person", "name": "Abhijit Ahaskar", "description": "Abhijit Ahaskar is an Assistant Editor at Toolbox. He has over 11 years of experience covering B2B technologies, including cybersecurity, automation, AI, IoT and cloud computing. He has previously worked at Mint, PCQuest and MyMobile.\r\nYou can get in touch with him at abhijit.ahaskar@swzd.com", "url": "https://www.spiceworks.com/user/about/abhijit-ahaskar/", "sameAs": [ "https://twitter.com/abhijitahaskar?lang=en", "https://www.linkedin.com/in/abhijit-ahaskar-a0934a2b/" ], "image": { "@type": "ImageObject", "url": "https://images.spiceworks.com/wp-content/uploads/2021/06/03053736/Mugshot-150x150.jpg", "height": 96, "width": 96 } }, "editor": { "@type": "Person", "name": "Abhijit Ahaskar", "description": "Abhijit Ahaskar is an Assistant Editor at Toolbox. He has over 11 years of experience covering B2B technologies, including cybersecurity, automation, AI, IoT and cloud computing. He has previously worked at Mint, PCQuest and MyMobile.\r\nYou can get in touch with him at abhijit.ahaskar@swzd.com", "url": "https://www.spiceworks.com/user/about/abhijit-ahaskar/", "sameAs": [ "https://twitter.com/abhijitahaskar?lang=en", "https://www.linkedin.com/in/abhijit-ahaskar-a0934a2b/" ], "image": { "@type": "ImageObject", "url": "https://images.spiceworks.com/wp-content/uploads/2021/06/03053736/Mugshot-150x150.jpg", "height": 96, "width": 96 } }, "publisher": { "@type": "Organization", "name": "Spiceworks", "url": "https://www.spiceworks.com", "logo": { "@type": "ImageObject", "url": "https://images.spiceworks.com/wp-content/uploads/2022/11/10090900/spiceworkslogo.png", "width": "220", "height": "69" } }, "image": [ { "@type": "ImageObject", "@id": "https://www.spiceworks.com/it-security/security-general/articles/important-cybersecurity-terms/#primaryimage", "url": "https://images.spiceworks.com/wp-content/uploads/2021/10/04053151/shutterstock_1817476859.jpg", "width": "1200", "height": "900", "caption": "Cybersecurity Awareness Month" }, { "@type": "ImageObject", "url": "https://images.spiceworks.com/wp-content/uploads/2021/10/04053151/shutterstock_1817476859.jpg", "width": "1200", "height": "720", "caption": "Cybersecurity Awareness Month" }, { "@type": "ImageObject", "url": "https://images.spiceworks.com/wp-content/uploads/2021/10/04053151/shutterstock_1817476859.jpg", "width": "1200", "height": "675", "caption": "Cybersecurity Awareness Month" }, { "@type": "ImageObject", "url": "https://images.spiceworks.com/wp-content/uploads/2021/10/04053151/shutterstock_1817476859.jpg", "width": "600", "height": "600", "caption": "Cybersecurity Awareness Month" }, { "@type": "ImageObject", "url": "https://images.spiceworks.com/wp-content/uploads/2024/10/02164746/CloudflareDDosCount.png", "width": 560, "height": 241, "caption": "Security Terms: DDoS - Cloudflare mitigated 13.9 million DDoS attacks in 2023" }, { "@type": "ImageObject", "url": "https://images.spiceworks.com/wp-content/uploads/2024/10/02164912/RansomwarePayments.png", "width": 560, "height": 240, "caption": "Security Terms - Ransomware - Ransomware payments hit $1.1 billion in 2023" }, { "@type": "ImageObject", "url": "https://images.spiceworks.com/wp-content/uploads/2024/10/02165027/ZombiePhish.png", "width": 560, "height": 240, "caption": "Security Terms - Phishing - A zombie phish attack restarts an old thread" }, { "@type": "ImageObject", "url": "https://images.spiceworks.com/wp-content/uploads/2024/10/02165247/StolenCredentials.png", "width": 560, "height": 240, "caption": "Security Terms - PAM - 86% of breaches involve stolen credentials" }, { "@type": "ImageObject", "url": "https://images.spiceworks.com/wp-content/uploads/2024/10/02165357/ZeroTrustStrategy.png", "width": 561, "height": 240, "caption": "Security Terms - Zero Trust - In 2023, Okta found 61% of organizations use ZTNA" } ] }, { "@context": "https://schema.org/", "@type": "BreadcrumbList", "@id": "https://www.spiceworks.com/it-security/security-general/articles/important-cybersecurity-terms/#breadcrumb", "itemListElement": [ { "@type": "ListItem", "position": 1, "item": { "@id": "https://www.spiceworks.com", "name": "Spiceworks Inc" } }, { "@type": "ListItem", "position": 2, "item": { "@id": "https://www.spiceworks.com/(tech|marketing|security|supplychain|hr|finance|collaboration)/articles/", "name": "Articles" } }, { "@type": "ListItem", "position": 3, "item": { "@id": "https://www.spiceworks.com/it-security/security-general/articles/important-cybersecurity-terms/", "name": "25 Security Terms You Should Know" } } ] }] </script> <link rel='stylesheet' id='mo-wp-style-icon-css' href='https://www.spiceworks.com/wp-content/plugins/miniorange-login-openid/includes/css/mo_openid_login_icons.css?version=7.6.9&ver=v3.2.4' type='text/css' media='all' /> <link rel='stylesheet' id='mo-openid-sl-wp-font-awesome-css' href='https://www.spiceworks.com/wp-content/plugins/miniorange-login-openid/includes/css/mo-font-awesome.min.css?ver=v3.2.4' type='text/css' media='all' /> <link rel='stylesheet' id='mo_openid_admin_settings_style-css' href='https://www.spiceworks.com/wp-content/plugins/miniorange-login-openid/includes/css/mo_openid_style.css?version=7.6.9&ver=v3.2.4' type='text/css' media='all' /> <script type="text/javascript" src="https://www.google.com/recaptcha/api.js?render=6LcGSvYiAAAAAEIee_n3eNYguqzTe_TJfCH4YuLj&ver=2.2" id="recaptcha-js-js"></script> <script type="text/javascript" src="https://www.spiceworks.com/wp-content/plugins/wp-custom-blogs/js/bootstrap.min.js?ver=1.2" id="script-js"></script> <script type="text/javascript" id="autosearch_js_script-js-extra"> /* <![CDATA[ */ var params = {"ajax_url":"https:\/\/www.spiceworks.com\/wp-admin\/admin-ajax.php","nonce":"4c583431bc"}; /* ]]> */ </script> <script type="text/javascript" src="https://www.spiceworks.com/wp-content/themes/gauge-child/js/auto-search.js?ver=2.2" id="autosearch_js_script-js"></script> <script type="text/javascript" src="https://www.spiceworks.com/wp-content/themes/gauge/lib/scripts/modernizr.js?ver=6.6.2" id="modernizr-js"></script> <script type="text/javascript" src="https://www.spiceworks.com/wp-content/themes/gauge/lib/scripts/selectivizr.min.js?ver=6.6.2" id="selectivizr-js"></script> <script type="text/javascript" src="https://www.spiceworks.com/wp-content/themes/gauge/lib/scripts/placeholders.min.js?ver=6.6.2" id="placeholder-js"></script> <script type="text/javascript" src="https://www.spiceworks.com/wp-content/themes/gauge/lib/scripts/jquery.ui.totop.min.js?ver=6.6.2" id="jquery-totop-js"></script> <script type="text/javascript" src="https://www.spiceworks.com/wp-content/themes/gauge/lib/scripts/jquery.stellar.min.js?ver=6.6.2" id="jquery-stellar-js"></script> <script type="text/javascript" src="https://www.spiceworks.com/wp-content/themes/gauge/lib/scripts/jquery.video-header.js?ver=6.6.2" id="ghostpool-video-header-js"></script> <script type="text/javascript" id="ghostpool-custom-js-js-extra"> /* <![CDATA[ */ var ghostpool_script = {"url":"https:\/\/www.spiceworks.com\/it-security\/security-general\/articles\/important-cybersecurity-terms\/","headerHeight":"125px","smallHeaderHeight":"83.3333333333","logoHeight":"69px","logoMarginTop":"0","logoMarginBottom":"0","headerSizeReduction":"1.5","lightbox":"group_images","hide_move_primary_menu_links":"enabled"}; /* ]]> */ </script> <script type="text/javascript" src="https://www.spiceworks.com/wp-content/themes/gauge/lib/scripts/custom.js?ver=6.6.2" id="ghostpool-custom-js-js"></script> <script type="text/javascript" id="ghostpool-ajax-loop-js-extra"> /* <![CDATA[ */ var ghostpoolAjax = {"ajaxurl":"https:\/\/www.spiceworks.com\/wp-admin\/admin-ajax.php","ajaxnonce":"3e724c795c","querystring":"topic=security-general&articles=important-cybersecurity-terms&post_type=articles&name=important-cybersecurity-terms"}; /* ]]> */ </script> <script type="text/javascript" src="https://www.spiceworks.com/wp-content/themes/gauge/lib/scripts/ajax-loop.js?ver=6.6.2" id="ghostpool-ajax-loop-js"></script> <script type="text/javascript" src="https://www.spiceworks.com/wp-content/themes/gauge-child/js/img-zoom.js?ver=1.1.2" id="img-zoom-js"></script> <script></script><!-- moved footer evidon popup and JS code to GTM --> <script> //comment hide var stringcheck = $(".gp-entry-meta .gp-meta-comments a").text(); var stringcheckSpan = $(".gp-entry-meta .gp-meta-comments span").text(); if(stringcheck == "No Comments" || stringcheck == "Comments Closed"){ $(".gp-meta-comments").hide(); } if(stringcheckSpan == "No Comments" || stringcheckSpan == "Comments Closed"){ $(".gp-meta-comments").hide(); } $(document).ready(function () { var relUrl = "h"; $('.check-email-verification .close').click(function(e) { window.location.href = relUrl; }); }); //sr-1033-added the script for copy paste the table of content right side var elmnt = document.getElementsByClassName("right-section-1")[0]; var cln = elmnt.cloneNode(true); $('.adcode-sidebar-two').append(cln); $('.adcode-sidebar-two .right-section-1 ul:nth-child(2)').addClass("right-section-2"); $(".btn-overflow1").click(function(){ $(".new_recommended_reads .right-section-1 ul:nth-child(2)").toggleClass("right-section-2"); }); $('.right-section-1 h3, .right-section-1 h2').addClass('up-arrow'); if ($(window).width() < 3000 && $(window).width() > 768 ) { $stick = $('.adcode-sidebar-two '); jQuery(function($) { function fixDiv() { var $cache = $('.adcode-sidebar-two .right-section-1'); if ($(window).scrollTop() > $stick.offset().top) $cache.css({ 'position': 'fixed', 'top': '285px', 'padding': '0px 0px 0px 16px', 'width': '24%', 'z-index':'0' }); else $cache.css({ 'position': 'static', 'padding': '0px 0px 0px 16px', 'width': '95%' }); } $(window).scroll(fixDiv); fixDiv(); }); } if ($(window).width() < 767) { var elmnt = document.getElementsByClassName("right-section-1")[0]; var cln = elmnt.cloneNode(true); $('.new_recommended_reads').append(cln); } $(".right-section-1 h3, .right-section-1 h2, .right-section-1 h4").click(function() { $('.right-section-1 ul').toggleClass("toggleClas"); $('.right-section-1 h3, .right-section-1 h2').toggleClass("up-arrow"); $('.right-section-1 h3, .right-section-1 h2').removeClass("up-arrow"); $('.right-section-1 h3, .right-section-1 h2').toggleClass('up-arrow down-arrow'); }); //End sr-added the script for copy paste the table of content right side //sr-add-for-scroll-issue $("a[href='#']").attr('href', 'javascript:void(0)'); //End sr-add-for-scroll-issue </script> <!-- Aberdeen Pixel's --> <script async id="tbw_pixel" type="text/javascript" src="//d26x5ounzdjojj.cloudfront.net/tbw/pixels/L3600c451a44ee7b6.js" tbw_site_id="L3600c451a44ee7b6" tbw_segment="security" tbw_log="1"></script> <!-- End Aberdeen Pixel's --> <script type="text/javascript"> jQuery('.n-12,.new-13').prev().addClass('hide-last-one-c'); </script> <script> jQuery(document).ready(function(title) { jQuery('a:not([title])').each(function(t){ jQuery(this).attr('title',jQuery(this).text().trim()); }); }); </script> <script> /* $( document ).ready(function() { setTimeout(function(){ //var searchClass = $("input[placeholder='Search Spiceworks']").attr('class'); //searchClass = searchClass.replace('search-input', 'search-input-spiceworks'); //$("input[placeholder='Search Spiceworks']").attr('class', 'search-input-spiceworks') //$("input[placeholder='Search Spiceworks']").attr('class', searchClass); $("input[placeholder='Search Spiceworks']").attr('name', 'query'); //$("input[placeholder='Search Spiceworks']").attr('id', 'search_keyword'); $('.search-wrapper form').attr('method','GET'); $('.search-wrapper form').attr('action','/search'); $('.search-wrapper form').keydown(function(event) { // enter has keyCode = 13, change it if you want to use another button if (event.keyCode == 13) { var keywoprd = $("input[placeholder='Search Spiceworks']").val(); keywoprd = keywoprd.trim(); if(keywoprd!=''){ if($(".searchClear").is(":focus")){ $('#search-input-spiceworks').val(''); $('.search-box-results').hide(); return false; } $('.search-wrapper form').submit(); return false; } } }); }, 3000); });*/ </script> <script> $( document ).ready(function() { $('a[title="News"]').click(function(){ if($("#ajax-load-more-2").find('.alm-listing').find('.homepage-listing').length==0) { $("#ajax-load-more-2").find(".alm-load-more-btn").trigger( "click" ); } }); $('a[title="Expert Insights"]').click(function(){ if($("#ajax-load-more-3").find('.alm-listing').find('.homepage-listing').length==0) { $("#ajax-load-more-3").find(".alm-load-more-btn").trigger( "click" ); } }); $('a[title="Videos"]').click(function(){ if($("#ajax-load-more-4").find('.alm-listing').find('.homepage-listing').length==0) { $("#ajax-load-more-4").find(".alm-load-more-btn").trigger( "click" ); } }); }); </script> <!--Zoho session--> <script> $( document ).ready(function() { $("#zoho_session_starter").click(function(){ $('#zoho_session_starter').attr('disabled','disabled'); $("#zoho_session_starter").html("Starting Session..."); $.ajax({ type : "POST", dataType : "json", url : 'https://www.spiceworks.com/wp-admin/admin-ajax.php', data : { action: "start_zoho_session", nonce: 'e601cede9b', }, success: function(response) { var result; result = JSON.parse(response); if(typeof result.representation!=='undefined' && typeof result.representation.session_id!=='undefined' && result.representation.session_id>1){ if(typeof result.representation.technician_url!=='undefined'){ window.open(result.representation.technician_url); } }else{ if(typeof result.error!=='undefined' &&typeof result.error.message!=='undefined'){ alert("Error: " + result.error.message); } } $('#zoho_session_starter').removeAttr('disabled'); $("#zoho_session_starter").html("Start remote session"); } }); }); }); </script> <!----> <!-- LinkedIn Pixels Start --> <script type="text/javascript"> _linkedin_partner_id = "6488140"; window._linkedin_data_partner_ids = window._linkedin_data_partner_ids || []; window._linkedin_data_partner_ids.push(_linkedin_partner_id); </script><script type="text/javascript"> (function(l) { if (!l){window.lintrk = function(a,b){window.lintrk.q.push([a,b])}; window.lintrk.q=[]} var s = document.getElementsByTagName("script")[0]; var b = document.createElement("script"); b.type = "text/javascript";b.async = true; b.src = "https://snap.licdn.com/li.lms-analytics/insight.min.js"; s.parentNode.insertBefore(b, s);})(window.lintrk); </script> <noscript> <img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=6488140&fmt=gif" /> </noscript> <!-- LinkedIn Pixels End --> </body> </html> <script type="text/javascript"> $( document ).ready(function() { var fr_title = ""; var de_title = ""; var ip_code = Cookies.get("ip_code"); if(ip_code == '' || ip_code == undefined || ip_code == null){ if(fr_title || de_title){ var response = getIPfromIPinfo(); console.log(response); ip_code = response.country; console.log(ip_code); Cookies.set("ip_code", ip_code, { expires : 10 }); } } hide_show_title_desc(ip_code); function hide_show_title_desc(ip_code = null){ if(ip_code == 'FR'){ var fr_title = ""; if (fr_title){ $("#title").remove(); $("#description").remove(); $("#title_de").remove(); $("#description_de").remove(); $("#title_fr").show(); $("#description_fr").show(); $("#excerpt").remove(); } else { $("#title").show(); $("#description").show(); $("#excerpt").show(); } } else if(ip_code == 'DE'){ var de_title = ""; if (de_title){ $("#title").remove(); $("#description").remove(); $("#title_fr").remove(); $("#description_fr").remove(); $("#title_de").show(); $("#description_de").show(); $("#excerpt").remove(); } else { $("#title").show(); $("#description").show(); $("#excerpt").show(); } } else { $("#title").show(); $("#description").show(); $("#title_fr").remove(); $("#description_fr").remove(); $("#title_de").remove(); $("#description_de").remove(); } } }); function getIPfromIPinfo() { var result = null; var scriptUrl = "https://ipinfo.io/json?token=ec4300bb7cd432"; $.ajax({ url: scriptUrl, type: 'get', dataType: 'json', async: false, success: function(data) { result = data; } }); return result; } </script>