• Partners
  • Contact Us
  • Client Support
Coretelligent
  • About
    • Why Choose Coretelligent As Your Managed Service Provider?
    • Core Values
    • Leadership
    • Testimonials
    • Careers
  • Digital Transformation
    • DTS Overview
    • Data Analytics, Data Management, and Business Intelligence Insights
    • Compliant Infrastructure for Life Sciences
    • Workflow Automation
  • Managed IT Services
    • Overview
    • Security & Compliance
    • IT Compliance for Financial Services
    • Comprehensive IT Support
    • IT Planning & Strategy
    • Unified Cloud Management
    • Backup & Disaster Recovery
    • Co-Managed Services
  • Industries
    • Overview
    • Financial Services
    • Life Sciences
    • Professional Services
  • IT Resources
    • Resource Library
    • Blog
    • On-Demand Webinars and Videos
    • Press Releases
    • Media Coverage
  • Contact
  • Search
  • Menu

Insights Articles

Our Information Technology Views and Articles

5 Cybersecurity Terms You Have Come Across But Might Not Know

Insights
June 17, 2021

Cybersecurity TermsAs you read or listen to the news about the increase in cybercrime—or as you evaluate your organization’s cybersecurity posture–you may come across some unfamiliar terminology. While you do not have to become a cybersecurity expert, having at least a basic knowledge of cybersecurity terms can be an advantage in today’s cybersecurity ecosystem.

Read on to learn more about some of the cybersecurity terms that you have likely come across.

5 Cybersecurity Terms You Should Know

1.Blockchain is the technology that makes digital currencies like Bitcoin possible. Blockchain is a continuous record of cryptographically encrypted transactions that are duplicated and distributed across a network. Individual records are referred to as blocks, and when combined, they form a chain. Each transaction is timestamped, which allows those with access to confirm individual transactions. First created in 2008, blockchain technology can be used for other applications where a secure ledger of transactions is required.

The creation of blockchain and the emergence of cryptocurrencies has spurred an increase in ransomware. Since blockchain technology is exceptionally secure, cryptocurrencies make it easier for cybercriminals to evade law enforcement.

2. Domain Spoofing is a form of phishing in which cybercriminals impersonate a legitimate source to gain access to a secure system. The criminals employ false domains that appear legitimate to trick users into divulging details to allow hackers to access a secure network. FINRA recently shared a warning about bad actors sending out emails with fake domains that look legitimate but were not.

3. Data Exfiltration is the illicit transfer of data from within an organization’s systems to an external location. This transfer can be completed via hacking, phishing, other social engineering tactics, malware, or even a USB device. Frequently, organizations never even become aware that sensitive data has been exposed or later learn due to ransomware or other cyberattacks.

Cybercriminals are increasingly using data exfiltration as a tactic to pressure victims into complying with ransom demands by threatening to publicly release sensitive data, like proprietary information or confidential client data. Even enterprises with a robust data backup and recovery system could feel pressured to pay to keep sensitive data from being made public. The best defense is to not become a victim in the first place by implementing a strong cybersecurity posture.

4. Pen Test, or penetration testing, is a cybersecurity evaluation method performed by cybersecurity professionals to determine the effectiveness of an organization’s cybersecurity protections. A pen test is an advanced form of security assessment that looks for flaws very much in the same way that hackers do, but with the expressed purpose of strengthening an organization’s network. Coretelligent offers penetration testing as a service to clients utilizing CoreArmor.

5. RaaS, or Ransomware as a Service, is a business model in which a criminal group creates and leases malware to other cybercriminals who then use it to hack a victim organization’s data, encrypt that data and demand a ransom. The ransomers pay for the use of the malware, just like a legitimate business might pay for a subscription to use Salesforce, Microsoft, or Amazon Web Services.

About Coretellligent

Led by world-class technology experts, Coretelligent offers best-in-class services covering a full range of technology needs: 360 Support, Unified Cloud Management, CoreBDR, and CoreArmor. Top-tier organizations in the financial services, life sciences, technology, legal, and professional services sectors rely on Coretelligent to maximize their technology return on investment.

by Jen Wallace
« Boost Your Enterprise Capacity with a Better Understanding of Cloud Computing EnvironmentsHow is the New Normal of the Hybrid Workplace a Cybersecurity Challenge? »

Latest Insights / Articles

January 9, 2023

What is SOX Compliance & What are the Requirements? (2023 Update)

January 8, 2023

Financial Services Compliance: What to Know in 2023

January 6, 2023

What Is Cyber Insurance Compliance? What You Need to Know

January 4, 2023

What is Cyber Hygiene & Why is it Important? (Best Practices)

Read our Latest Resources
Digital Transformation Case Study

Leveraging Digital Transformation: A Multiphase Case Study

Download Now
Compliant Infrastructure Case Study

Therapeutics Company Benefits from Compliant Infrastructure

Download Now
On-Demand Webinar: Solving Compliance & Cybersecurity for Financial Firms

On-Demand Webinar: Solving Compliance & Cybersecurity for Financial Firms

Download Now

About

  • Why Choose Coretelligent As Your Managed Service Provider?
  • Core Values
  • Leadership
  • Testimonials
  • Partners
  • Careers

Solutions

  • Overview
  • IT Planning & Strategy
  • Comprehensive IT Support
  • Security & Compliance
  • Unified Cloud Management
  • Backup & Disaster Recovery
  • Co-Managed Services
  • Digital Transformation Services

Industries

  • Overview
  • Financial Services
  • Life Sciences
  • Professional Services

Contact

Sales & Support: 1-855-841-5888

Email: info@coretelligent.com

Support Service Center

Let’s Talk

Schedule a no-obligation consultation.

Contact Us Today

Locations

Atlanta

Boston

Chicago

Dallas

Houston

Los Angeles

Maryland

New York

Philadelphia

Portland

San Francisco

Stamford

Tampa

Washington, D.C.

West Palm Beach

Virginia

Follow Us

  • Facebook
  • Twitter
  • LinkedIn

© 2022 Coretelligent. All rights reserved.

Privacy Policy

CCPA Privacy Notice

Scroll to top