Cybersecurity Glossary

To implement effective cybersecurity solutions built for the digital world, it’s important to understand common industry concepts and definitions. This glossary provides you with cybersecurity terms to be aware of as you look to protect your organization against cyber threats.

Malicious email attachments

Malicious email attachments contain hidden malware or viruses in an attempt to gain access to the recipient’s system and exploit them. Cybercriminals use convincing email content to deceive the reader into clicking the malicious email attachment, which often contains malware or phishing links. The best line of defense against malicious email attachments is advanced email security with automatic and assisted remediation and the ability for admins to inspect malicious attachments without risk of exposure.

Malvertising

Malvertising is the malicious use of online advertising to spread malware or phishing links, with the intent of infecting a user's computer with malware or stealing personal data. Malvertising can exploit users even when they don’t click it and result in drive-by downloads, redirects to malicious websites, and more.

Malware

Malware, short for malicious software, is any firmware or software that’s designed to infect or steal information from one or multiple computer systems.

Read more ›
Man in the browser (MiTB) attack

Like man-in-the-middle (MiTM) attacks, man-in-the-browser (MiTB) attacks focus on intercepting calls between an executable application (EXE) and its libraries (DLL). MiTB deploys a Trojan Horse to capture and manipulate calls made from the browser to its security mechanisms. Most commonly, MiTB attacks are used to facilitate financial fraud and modify transactions without alerting the user.

Man in the middle attack (MitM)

A man in the middle attack (MitM) is when someone intercepts sensitive information or data by either eavesdropping on a conversation or data transfer between two parties or impersonating one of the parties. A person carrying out a MitM attack may be undetectable to the legitimate participants, which enables them to obtain sensitive information or pass on malicious links without triggering any red flags.

Managed security service provider (MSSP)

A managed security service provider (MSSP) is a type of managed service provider specializing in cybersecurity. MSSPs manage and monitor all facets of cybersecurity for organizations, replacing the need to manage network security in-house. 

Managed service provider (MSP)

Managed service providers (MSPs) are third-party organizations hired by companies to manage one or more of their IT functions. MSPs offer a range of services, including IT consulting, cloud services, remote monitoring and management of information systems, and security services. Managed security is one of the fastest growing service areas for MSPs, as cyberattacks on businesses continue to sharply rise.

Message transfer agent (MTA)

A message transfer agent (MTA) is software that is responsible for delivering email from the sender’s device to the recipient’s. MTAs deal with the complexities of deliverability at scale from scheduling, queuing, bouncing and more. In the past, MTAs were mainly managed by third-party vendors but the newer, customizable MTAs give service providers complete control over the process and eliminate the need to outsource MTAs.

MFA bypass

MFA bypass is a security vulnerability that allows an attacker to bypass multi-factor authentication (MFA) and gain access to a user's account or device without needing the second or subsequent factor of authentication.

Multi-factor authentication (MFA)

Multi-factor authentication (MFA) is a security measure that uses at least two different login methods to verify a person’s identity. As opposed to logging in via username and password, MFA uses tools such as security questions, unique codes sent to phones or email addresses, or fingerprint technology to further secure an individual’s account. MFA helps organizations protect individual corporate accounts and defend against unauthorized access, data breaches, and more.

Ready to choose Vade for M365?