Cybersecurity Resource Center
Learn about the main cyber threats, malware, hacking and how to protect yourself from cybercrime.
Everything you need to know about cybersecurity basics
Cybersecurity is the practice of protecting computers, servers, networks, and data from cyberattacks. These attacks aim to access, steal, or destroy sensitive information, extort money, or disrupt business operations. Effective cybersecurity measures include using firewalls, encryption, and secure protocols to defend against these threats.
Network security involves securing a computer network from intruders, both targeted attackers and opportunistic malware. Application security focuses on keeping software and devices free from threats, starting from the design stage. Information security ensures the integrity and privacy of data, both in storage and during transmission. Operational security covers the processes and decisions for handling and protecting data assets.
Disaster recovery and business continuity are crucial for responding to cybersecurity incidents and maintaining operations during disruptions. Educating end-users on best practices, such as recognizing phishing attempts and using strong passwords, is essential for preventing accidental security breaches. With the increasing complexity of cyber threats, a comprehensive approach to cybersecurity is vital for protecting sensitive information and ensuring the smooth operation of businesses and personal systems.
Antivirus
What’s the difference between antivirus and anti-malware protection? Both refer to cybersecurity software, but what do these terms mean, and how do they relate to today’s online digital threats?
Malware
Malware, or malicious software, is a blanket term for any kind of computer software with malicious intent. Most online threats are some form of malware.
Ransomware
Ransomware is an emerging form of malware that locks the user out of their files or their device, then demands an anonymous online payment to restore access.
Adware
Adware is a form of malware that hides on your device and serves you advertisements. Some adware also monitors your behavior online so it can target you with specific ads.
Spyware
Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information like bank details and passwords.
Hacker
Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. Hackers are motivated by personal gain, to make a statement, or just because they can.
Phishing
Phishing is a method of tricking you into sharing passwords, credit card numbers, and other sensitive information by posing as a trusted institution in an email or phone call.
Data Breach
A data breach comes as a result of a cyberattack that allows cybercriminals to gain unauthorized access to a computer system or network and steal the private, sensitive, or confidential personal and financial data of the customers or users contained within.
2 FA
Two-factor authentication (2FA) offers a two-step process for your authentication, making protection of your online accounts more secure.
Trojan
Trojans are programs that claim to perform one function but actually do another, typically malicious. Trojans can take the form of attachments, downloads, and fake videos/programs.
AI in cybersecurity
AI, short for Artificial Intelligence, involves various techniques and algorithms that enable computers to analyze data, make decisions, and perform tasks that typically require human intelligence, leading to advancements in cyber security, while also creating risks.
Emotet
Emotet is a kind of malware originally designed as a banking Trojan aimed at stealing financial data, but it’s evolved to become a major threat to users everywhere.
Keylogger
Keyloggers secretly record what you see, say and do on your computer. Employers use keyloggers to watch employees, but cybercriminals use them too.
DDoS
DDoS is a malicious network attack in which hackers overwhelm a website or service with false web traffic or requests from numerous enslaved Internet-connected devices.
Spam
Spam is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. And it’s more than a nuisance. Spam today is a serious threat.
What is authentication
Authentication is the process of verifying the identity of a user, device, or system. It is a cyber security method used to ensure that the person or entity attempting to access a resource is authorized to do so.
Spoofing
Spoofing is when someone or something pretends to be something else in an attempt to gain a victim’s confidence, get access to a system, steal data, or spread malware.
Cryptojacking
Cryptojacking is a form of malware that hides on your device and steals its computing resources in order to mine for valuable online currencies like Bitcoin.
Catfishing
Catfishing (also referred to as catphishing) is when someone takes pictures and information from other people and makes up a fake identity.
Exploits
Exploits take advantage of software vulnerabilities, hidden in the code of the OS and its applications, which cybercriminals use to gain illicit access to your system.
Doxxing
Doxxing comes from the term “dropping documents”, and is the act of publishing someone’s personal, confidential information on the internet, often with malicious intent.
Incognito Mode
Learning how to use Incognito mode certainly has its benefits on a shared computer. With private browsing mode, you can covertly shop for a gift for a loved one, research sensitive topics that you wish to keep private from people at home or keep your funny cat video viewing habits a secret.
Identity theft
Identity theft occurs when a criminal obtains or uses the personal information; e.g. name, login, Social Security number, date of birth, etc., of someone else to assume their identity or access their accounts for the purpose of committing fraud, receiving benefits, or gaining financially in some way.
Computer virus
A computer virus is malware attached to another program (such as a document), which can replicate and spread after an initial execution on a target system where human interaction is required. Many viruses are harmful and can destroy data, slow down system resources, and log keystrokes.
Dark Web
The dark web might sound like a mysterious part of the internet, and in many ways, it is. It’s a segment of the internet hidden from view, not showing up in search results or accessible through regular web browsers.
What is VPN
A VPN, or virtual private network, is a secure connection between people and devices over the Internet. A VPN makes going online safer and more private by stopping people from seeing who you are, where you are, or what you’re looking at.
Social engineering
Social engineering refers to the methods cybercriminals use to get victims to take some sort of questionable action, often involving a breach of security, the sending of money, or giving up private information.
Password manager
A password manager is a software application designed to store and manage online credentials. Usually, these passwords are stored in an encrypted database and locked behind a master password.
Password Generator
What is a strong password? How can you generate a password that is unique and impossible to crack. Use our Password Generator tool.
Pharming
Pharming involves the redirection of web traffic from legitimate sites to a fake sites for the purpose of stealing usernames, passwords, financial data, and other personal information.
Deepfakes
A “deepfake” refers to recreated media of a person’s appearance and/or voice by a type of artificial intelligence called deep learning (hence the name, deepfake).
Trickbot
TrickBot is a banking Trojan that can steal financial details, account credentials, and personally identifiable information (PII), as well as spread within a network and drop ransomware, particularly Ryuk.
Phishing
Phishing is when hackers pretend to be real companies to fool people into sharing private information like personal details, bank account info, and passwords. Once they get this info, they can steal the person’s identity or money.
Internet Security
Internet security is the collection of practices, technologies, and concepts that shield any Internet-connected software or hardware we use from online threats.
PII (Personally identifiable information)
PII, refers to data that can be used on its own or in conjunction with other information to identify, contact, or locate a single person. This includes direct identifiers like social security numbers and email addresses, which can uniquely identify a person.
SafeSearch
SafeSearch is a feature provided by search engines to filter out explicit or inappropriate content from search results. It helps create a safer browsing experience by blocking or hiding potentially offensive or explicit images, videos, and websites.
Smishing
The term “smishing” may sound silly, but the smishing meaning is less amusing than it sounds. A smishing attack is a type of phishing attack that leverages text messages as an attack vector.
Swatting
Swatting is a dangerous and illegal prank where someone makes a false report of a serious crime, such as a hostage situation or active shooter, in order to send a SWAT team or other law enforcement officers to a targeted location.
Protect your digital footprint
How can you check your digital footprint? Is your digital footprint permanent? How can you monitor dark web for exposure? How to protect your privacy online:
Learn about Internet safety and privacy
Don’t let malware and other cyberthreats ruin your day. Stay one step ahead of the cybercriminals with our tips, tricks, and guides for staying safe, having fun, and getting things done online.