Understanding Cyber Security Terminology – May Alert

In Cyber Alert by Justin Dauley

SMALL BUSINESS CYBER SECURITY ALERT

– Month of May 2017 –

Understanding Cyber Security Terminology

As an IT company, we understand how important it is for businesses to safeguard against the wide array of cyber threats that exist online. We have seen time and time again how detrimental a data breach can be for a company. Not only can the financial impact be overwhelming, but losing the trust of customers who are vital for success can be devastating for businesses in any industry. Keeping these threats at bay should be a top priority for any company that is storing data, processing transactions, or communicating in any way online. This task can be overwhelming, especially due to the continuous stream of new threats online that are constantly trying to break into our devices and steal information.

With that being said, it is important to find an IT service provider which strives to stay on top of new cyber threats to ensure that the data of their clients is safe above all else. AVATAR does just that – our technicians truly care about our customers and are constantly following new developments in the field of cybersecurity to ensure that the software we offer sufficiently protects against new cyber threats. We like our customers to know what is going on too when it comes to cybersecurity, so here is a list of terminologies that relate to the field of cybersecurity:

1. Advanced Persistent Threat – when someone infiltrates a network and stays there over an extended period. Usually in these types of attacks, hackers are trying to steal data opposed to directly damaging an organization
2. Attack Vector – the path which is taken to a computer or network in order to achieve the unauthorized outcome
3. Black Hat – a person who maliciously exploits computer systems for personal gain
4. Botnet – an assembled group of computers that sends malicious transmissions via a network unknowingly to the user
5. Script Kiddies – people that conduct cyberattacks using existing scripts without true expertise in the field

 

References: “Hunt Cyber Threats” by Raymond Dennis, U.S. Naval Institute Proceedings, vol. 143, no. 4, Apr. 2017, pp. 66-68.

 

For more tips and information on cybersecurity and what you can do to protect your information, feel free to visit the AVATAR Blog. Here we post articles on a variety of technology topics and list Cyber Alerts from past months.

If your business has any security concerns or IT needs, please contact AVATAR Computing at 508.926.8673 or email us at contact@avatar-computing.com. We would be happy to help!