Cybersecurity 101

In today’s digital world, cybersecurity is essential. At WatchGuard, we break down key cybersecurity topics with clear explanations, practical examples, and proven best practices. Whether you want to learn about network security, endpoint protection, identity management, or cyber threats—start your journey with Cybersecurity 101.

A

Access Control Security

A foundational security process that regulates who is allowed to access certain apps, data, and resources, and under what conditions.

Adware

Adware (advertising-supported software) is automated, unwanted software that monitors online user behavior and displays targeted advertisements, banners, and pop-ups. Sometimes used as spyware to collect user data for cybercriminals.

Read More

Agentic AI

Unlike generative AI (GenAI) that requires prompts to get results, agentic AI is an autonomous system that uses tools (including GenAI) to perform tasks automatically - that is, with very little or no human intervention. Agentic AI can independently set goals, plan multi-step processes, make decisions, and take actions to achieve objectives.

Read More

Angler Phishing

A phishing attack via social networks such as LinkedIn, Facebook, Instagram, X (Twitter), and Snapchat.

Anti-Malware

Software that protects computers and networks from malicious software (malware) like viruses, ransomware, spyware, and worms.

Read More

Application Control

A WatchGuard security service that controls access to applications by granting, denying, or limiting permissions based on a user’s department, role, and the time of day, enhancing security and operational efficiency.

APT Blocker

A WatchGuard security service that detects and stops sophisticated attacks, including ransomware, zero-day threats, and other advanced malware, using cloud-based sandboxing with full-system emulation analysis to identify APT malware in files and email attachments that enter your network.

Artificial Intelligence (AI)

Ability of computer systems to perform tasks that usually require human intelligence, like learning, reasoning, problem-solving, perception, and decision-making, enabling machines to understand language, recognize patterns, and act autonomously to achieve goals.

Read More

Authentication

The process of verifying the identity of a user, device, or system, using factors like passwords, biometrics, or security tokens before granting access. Authentication usually requires something a person has (such as a key, badge, or token), something a person knows (such as a password, ID number, or mother's maiden name), or something a person is (face recognition, fingerprint, or retina scan, etc).