Preparing to up your security? Here’s 15 terms to Keep in Mind When Approaching an MSP.
A cybersecurity strategy is a critical component of any organization’s infrastructure, and with the constant evolvement of technologies and new trends, it’s important to have a solid foundation. A solid foundation starts with a basic understanding of key terminology to know how to build your strategy and what should be a part of it.
To help you get started, we have compiled a list of some key terms that you should know before meeting with an MSP or cybersecurity expert.
Types of Cybersecurity Attacks
Cyberattacks take a variety of forms. Here’s a quick breakdown of common culprits.
Phishing is a type of cyberattack that uses fraudulent emails or websites to trick victims into revealing sensitive information, such as login credentials or financial information. Phishing attacks are often difficult to distinguish from legitimate emails or websites, which is why it is important to be vigilant when opening any email attachments or clicking any links.
A form of social engineering in which a malicious actor sends a fraudulent text message to an intended victim with the goal of tricking the victim into sharing sensitive information or inadvertently installing malicious software on behalf of the bad actor.
A fraudulent technique whereby a malicious actor attempts to manipulate and trick a victim into performing actions or revealing information that assists the malicious actor in compromising or exploiting the victim’s computer, network or systems.
A form of social engineering in which a malicious actor sends a specifically targeted fraudulent email message to an intended victim with the goal of tricking the victim into sharing sensitive information or inadvertently installing malicious software on behalf of the bad actor by making the victim believe the information being shared or instructions being provided are from a trusted contact.
Any type of malicious software designed to harm a programmable device, service, or network is called malware. Here’s a list of common types of malware.
A type of malware in which a victim’s computer and/or data are encrypted and become unusable until a ransom payment is made, and the hacker provides a required decryption key.
A rootkit is a type of malicious software that allows an attacker to gain control over a victim’s computer. Once installed, a rootkit can be used to secretly collect information about the victim or to launch attacks on other computers. Rootkits are difficult to detect and remove and can often persist even after the initial attack has been thwarted.
A malicious computer program that replicates by infecting other files and applications that can corrupt systems and destroy data.
A standalone malicious program that replicates itself, without human interaction, by spreading to other computers on a network.
Prevention and Protection Management Terms
There are multiple processes, software, and technologies available to integrate into your cybersecurity defense strategy.
Intrusion Detection System (IDS)
A device or system that monitors network activity for malicious or suspicious actions or behaviors that violate preprogrammed norms, typically generating alerts when such conditions occur.
Intrusion Prevention System (IPS)
A device or system that monitors network activity for malicious or suspicious actions or behaviors that violate preprogrammed norms and that takes action to prevent exploitation or infection when such conditions occur.
Managed Detection and Response
Managed detection and response, or MDR, is a type of cybersecurity service that uses advanced monitoring tools to detect potential threats and respond to them quickly and efficiently. Unlike traditional antivirus software, managed detection and response services are designed to provide ongoing protection again an ever-evolving threat landscape.
Next-generation antivirus, or NGAV, is a type of antivirus software that goes beyond traditional detection methods to also protect against zero-day attacks and unknown malware. NGAV solutions are often cloud-based, which allows them to tackle new threats much more quickly than older antivirus software.
Security Event Management (SEM)
A cybersecurity strategy that emphasizes detecting, identifying, collecting, monitoring and reporting cybersecurity related events using software, hardware and services to better enable analyzing, responding to and managing cybersecurity design, policies and behaviors.
Security Information Management (SIM)
A cybersecurity strategy that emphasizes monitoring, capturing and analyzing computer and network security information, including data returned by individual security agents and captured by system log files, for the purpose of central collection and analysis.
Security Information and Event Management (SIEM)
A cybersecurity strategy in which security information management and security event management strategies and corresponding software, hardware, tools, and techniques are combined to provide organizations with next-generation cybersecurity detection, analytics and response.
There you have it! These are just a few of the key terms you should know before meeting with an MSP or cybersecurity expert. By familiarizing yourself with these terms, you can be sure that you’re getting the most out of your meeting and making the best decisions for your business. If you’re interested in a security assessment for your business, book an appointment with a member of our team today.