Cybersecurity 101

In today’s digital world, cybersecurity is essential. At WatchGuard, we break down key cybersecurity topics with clear explanations, practical examples, and proven best practices. Whether you want to learn about network security, endpoint protection, identity management, or cyber threats—start your journey with Cybersecurity 101.

R

Ransomware

Malware originally used to extort money from victims by encrypting or otherwise blocking access to applications or files until a sum of money is paid. Today, attackers’ more often steal information and threaten to make it public. For protection, Zero Trust Network Access (ZTNA) ensures that even if credentials are compromised, attackers cannot automatically access accounts, sensitive information, or critical services.

Read More

Ransomware as a Service (RaaS)

A cybercrime business model in which ransomware developers sell ransomware code or malware so that even inexperienced hackers can launch attacks using sophisticated tools.

Remote Access Trojan (RAT)

A type of malware that grants an attacker covert, administrative-level control over an infected device from a remote location. Acts as backdoors that allow threat actors to maintain persistence on a victim's computer and potentially load other malware or run malicious commands.

Remote Monitoring and Management (RMM)

The technology IT and MSPs use to centrally monitor, secure, and maintain networks, servers, and devices (endpoints). Modern RMM solutions support both on-premises and cloud infrastructure monitoring and remote smart device management to improve efficiency and cost.

Reputation Enabled Defense

A WatchGuard security service providing cloud-based web reputation service that aggregates data from multiple feeds to provide real-time protection from malicious sites and botnets.

Rogue Access Point

An unauthorized wireless access point installed on a secure network. Rogue access points increase the attack surface of a network and can potentially allow an attacker to obtain network access without being physically present in the building.

Role-Based Access Control (RBAC)

A security model that limits access to a computer network or system based on the user's role within an organization.