Cybersecurity 101

In today’s digital world, cybersecurity is essential. At WatchGuard, we break down key cybersecurity topics with clear explanations, practical examples, and proven best practices. Whether you want to learn about network security, endpoint protection, identity management, or cyber threats—start your journey with Cybersecurity 101.

A

Adware

Adware (advertising-supported software) is automated, unwanted software that monitors online user behavior and displays targeted advertisements, banners, and pop-ups. Sometimes used as spyware to collect user data for cybercriminals.

Read More

B

Backdoor

A hidden method, whether planned or an accidental design flaw, that allows stealthy entry into a network. Hackers can exploit vulnerabilities or install malicious software to create a backdoor, providing an entry point that bypasses security measures.

Business Email Compromise (BEC)

These attacks involve spoofed or compromised email accounts used to manipulate normal business workflows and redirect funds. What makes BEC especially dangerous is that it often does not require malware. It relies on trust, timing, and persuasion.

C

Clickjacking

A type of attack in which the victim clicks on links on a website they believe to be a known, trusted website. However, they are actually clicking on a malicious, hidden website overlaid onto the known website.

Credential Stuffing

An attack that uses stolen username and password combinations from previous data breaches to attempt logins into other services. Since many people reuse passwords, attackers run automated tools that test millions of credential pairs against target websites.

Cross-Site Scripting

An attack performed through web browsers, taking advantage of poorly-written web apps. For example, an attacker can trick a user into clicking on a specially crafted, malicious hyperlink that appears to lead to an innocent site, but the site is actually the attacker's and includes embedded scripts.

Cyber Attack

A cyberattack is a deliberate attempt by an individual or group to compromise another party’s information system. Attackers typically aim to disrupt operations or gain unauthorized access to data for personal or organizational gain.

Read More

D

Dark Web

A hidden part of the Internet requiring special browsers like Tor to access. Designed for user anonymity through onion routing, used for both legitimate purposes (privacy, anti-censorship) and illicit activities (black markets, illegal services).

Dark Web Credential Monitoring

Tools that can scan stealer logs, criminal forums, and third-party breaches on the dark web for your organization's exposed passwords. By providing visibility into exposed corporate credentials, it enables faster response and risk mitigation.

Dark Web Monitoring

A process of continually scanning the dark web to identify compromised, stolen, or leaked data. This can include intellectual property, credentials, and personal information.

Data Integrity

The concept that you can discern whether data is in the condition its authors or owners intend it to be, and that it has not been modified by unauthorized persons during storage or transmittal.

I

Indicator of Attack (IoAs)

A proactive, real-time behavioral indicator, like suspicious admin activity, abnormal user behavior, or privilege escalation, that reveals an attack is in progress.

Indicator of Compromise (IoCs)

A digital clue that helps security teams detect, investigate, and respond to malicious activity that has already taken place on a network or endpoint. Clues include a suspicious IP address, file hash, or unusual inbound and outbound network traffic.

M

Man-in-the-Middle (MitL)

Type of cyberattack where attackers secretly insert themselves into the communication channel established between two legitimate parties to read, intercept, or even manipulate the data traffic.

Read More

O

OIDC Security

Stands for OpenID Connect protocol. An identity authentication protocol used to enable two unrelated applications to share user profile information without compromising user credentials.

P

Passkey

A passwordless authentication standard that allows users to sign in to apps and websites using biometrics (fingerprint, face scan) or a device PIN instead of a password. Gives MSPs a way to offer phishing-proof authentication. Passkeys work like unlocking your phone, the same fingerprint or face, but now also for logging into apps. No password to forget. No code to intercept. And fake websites simply can't trick it.

S

Signature-Based Detection

Ability to identify threats by comparing system activity to a database of known attack patterns (signatures) to detect malicious behavior. The weakness of signature-based detection is that modern threats mostly rely on techniques that are not recognized by signatures alone.