Breaking down the jargon: Your cybersecurity dictionary

view of open book

Think cybersecurity is just for tech experts? Think again. Today's cybercriminals target businesses of all sizes—and they're counting on you not understanding their tactics. This guide breaks down the terms you need to know to protect your business.

Email scams

  • Phishing: Fake emails pretending to be from banks or vendors to steal your passwords. Watch for urgent requests and suspicious links.

  • Spear phishing: Targeted attacks using specific information about your business. Example: "Hi Sarah, here's the invoice from the Denver trade show" (when you already paid weeks ago).

  • Vishing: Phone scams where callers pose as IT support or government officials demanding immediate action.

  • Smishing: Text message scams, often about package deliveries. Example: "FedEx: Update payment info here [suspicious link]"

Data threats

  • Ransomware: Malicious software that locks your files until you pay. Your customer records suddenly become encrypted with demands for $50,000 in cryptocurrency.

  • Double extortion: Ransomware that both encrypts AND steals your data, threatening to publish client information online if you don't pay.

Human manipulation

  • Social engineering: Tricking people into breaking security rules through psychology rather than hacking. Example: "I'm the new employee and locked myself out—can you help?"

  • Business Email Compromise (BEC): Hackers impersonating your CEO or vendors. Watch for sudden payment changes or urgent wire transfer requests from "the boss."

  • Pretexting: Creating fake scenarios to steal information. Example: "I'm from your internet provider and need to verify your password."

Advanced threats

  • Zero-day exploits: Attacks using security holes that even software makers don't know exist—like thieves finding a hidden door the architect didn't know about.

  • IoT vulnerabilities: Security weaknesses in smart devices like cameras and printers that hackers exploit to access your network.

Your defense tools

  • Multifactor authentication (MFA): Requiring a password plus a secondary identity verification method (like a phone code). Even if hackers steal your password, they can't access your accounts without your phone.

  • Endpoint protection: Software monitoring all devices on your network for suspicious activity—like security cameras for your computers.

  • Network segmentation: Dividing your network into sections so problems can't spread—think fire doors in a building.

  • Offline backups: Data copies stored completely disconnected from your network. Ransomware can't encrypt what it can't reach.

Red flags to watch for

  • Urgent demands for money or information

  • Requests bypassing normal procedures

  • Generic greetings ("Dear customer")

  • Sudden payment method changes

  • Threats of account closure

  • Unexpected attachments or links

If something seems suspicious, it probably is

Understanding these terms isn't about becoming a tech expert—it's about recognizing threats before they cost you thousands. When something seems suspicious, it probably is. Verify through a different communication channel. Your business's security depends on it.

Back to issue