Cybersecurity 101

In today’s digital world, cybersecurity is essential. At WatchGuard, we break down key cybersecurity topics with clear explanations, practical examples, and proven best practices. Whether you want to learn about network security, endpoint protection, identity management, or cyber threats—start your journey with Cybersecurity 101.

B

Backdoor

A hidden method, whether planned or an accidental design flaw, that allows stealthy entry into a network. Hackers can exploit vulnerabilities or install malicious software to create a backdoor, providing an entry point that bypasses security measures.

Botnet

Collection of computers that are infected with small bits of code (bots) that allow a remote computer to control some or all of the functions of the infected machines. Typically used for disreputable purposes, such as denial of service attacks, click fraud, and spam.

Bring-Your-Own-Device (BYOD)

A common practice whereby employees can use their personally owned devices, like smartphones, laptops, and tablets for work purposes rather than company-issued devices. Increases exposure to malware, data leakage, and credential theft.

Business Email Compromise (BEC)

These attacks involve spoofed or compromised email accounts used to manipulate normal business workflows and redirect funds. What makes BEC especially dangerous is that it often does not require malware. It relies on trust, timing, and persuasion.