Cybersecurity Glossary

To implement effective cybersecurity solutions built for the digital world, it’s important to understand common industry concepts and definitions. This glossary provides you with cybersecurity terms to be aware of as you look to protect your organization against cyber threats.

Wannacry Ransomware

Wannacry Ransomware is a type of ransomware worm that can quickly infect many devices and encrypt sensitive information. After critical files have been encrypted, cybercriminals will then demand a ransom to decrypt the compromised data. Wannacry Ransomware came onto the scene in 2017, when computers all over the world running Windows were compromised via network vulnerabilities and users were asked to make ransom payments in the Bitcoin cryptocurrency. Wannacry Ransomware can spread incredibly fast, making it a major threat to organizations that have potential security gaps in their IT infrastructure.

Web proxy server

A web proxy server is a system or router that acts as an intermediary between users and the internet. A web proxy server provides a layer of security that helps prevent cybercriminals from entering a private network. Organizations use proxy servers for a variety of reasons, including controlling what websites employees can access, changing IP addresses and hiding end-user Internet activity from third parties, and improving network performance while saving bandwidth. While web proxy servers help protect against cyberthreats like malware, they still present vulnerabilities. That’s why web proxy servers are most effectively used in combination with other cybersecurity solutions, such as email security.

Whaling

Whaling is a type of phishing attack in which threat actors target senior executives by posing as a legitimate business or partner. In this type of attack, hackers commonly target C-level executives to initiate a wire transfer or obtain sensitive information. Hackers exploit victims by sending emails that contain phishing links or malicious attachments. Whaling is often highly targeted and uses personal information about the intended victim to tailor attacks, making them more effective than traditional phishing campaigns.

Ready to choose Vade for M365?