BlackFog Logo

Cybersecurity 101

A B C D E F G H I K M N O P R S T U V W Z

Insider Threat

An insider threat is a security risk that originates from within the target organization usually involving employees, vendors, executives, contractors or anyone else who works within the business. The risk posed by those who have access to an organization's physical or digital assets. These attacks are dangerous as they are hard to detect until [...]

2022-09-23T21:53:32+01:00September 21st, 2022|

Intellectual Property (IP)

Intellectual property (IP) is any type of design, invention, logo, symbol, image or name that it used by an organization in commerce. IP is a valuable asset that is protected to enhance an organization's competitive advantage in the marketplace.

2023-03-07T16:50:26+00:00March 7th, 2023|

IP Address

An Internet Protocol address, or IP address, is a unique numerical identifier assigned to every device connected to the Internet or a network. Computers use IP addresses to allow information to be sent between two devices on a network, on the Internet or on other networks.

2023-07-05T15:02:33+01:00July 5th, 2023|

Keylogger

Keyloggers are malicious software that tracks and records every keystroke entry made on a computer or mobile keyboard, without the permission or knowledge of the user, and sends it to the attacker(s).

2023-07-05T15:28:55+01:00July 5th, 2023|

Malvertising

Malvertising, also known as malicious advertising, refers to an attack in which cybercriminals inject malicious code into legitimate online advertising networks, redirecting users to malicious websites, with the goal of spreading malware. These malicious ads can exploit vulnerabilities in the user’s browser, operating system, or even in plugins like Flash or Java, leading to [...]

2024-11-14T14:29:59+00:00March 8th, 2023|

Malware

Malware is a term for any type of program, file or malicious software designed to infect, damage, exploit or gain access to a device, network or server.

2023-03-07T16:54:11+00:00March 7th, 2023|

Man in the Middle (MITM) Attack

A man in the middle (MITM) attack occurs when communications between two parties are intercepted by the attacker, with no knowledge of the parties involved. This gives the attacker the ability to steal credentials, spy on victims, sabotage victims or corrupt/manipulate data.

2023-07-05T14:58:17+01:00July 5th, 2023|

Managed Security Service Provider (MSSP)

A Managed Security Service Provider provides management and outsourced monitoring of systems and security devices to protect businesses against cybersecurity threats and respond to attacks when they happen. The main role of an MSSP is to protect the business, and all of its devices, from security threats through continuous monitoring and implemented systems and [...]

2022-09-23T21:54:28+01:00September 21st, 2022|

Managed Service Provider (MSP)

A Managed Service Provider (MSP) remotely delivers and manages customer’s IT infrastructure and end-user systems including network and infrastructure management and support. The outsourcing of certain services to MSPs is a way to cut costs for organizations and is also beneficial if they do not have the resources to have a full IT team [...]

2022-09-23T21:54:47+01:00September 21st, 2022|

MDR

Managed Detection and Response (MDR) solutions identify active threats and respond by eliminating, investigating or containing them. MDR solutions use a mix of technology and human expertise to monitor the environment and respond accordingly with 24/7 response from well-staffed cybersecurity personnel.

2022-10-14T08:53:49+01:00October 14th, 2022|