Cybersecurity 101

In today’s digital world, cybersecurity is essential. At WatchGuard, we break down key cybersecurity topics with clear explanations, practical examples, and proven best practices. Whether you want to learn about network security, endpoint protection, identity management, or cyber threats—start your journey with Cybersecurity 101.

A

Adware

Adware (advertising-supported software) is automated, unwanted software that monitors online user behavior and displays targeted advertisements, banners, and pop-ups. Sometimes used as spyware to collect user data for cybercriminals.

Read More

Anti-Malware

Software that protects computers and networks from malicious software (malware) like viruses, ransomware, spyware, and worms.

Read More

B

Backdoor

A hidden method, whether planned or an accidental design flaw, that allows stealthy entry into a network. Hackers can exploit vulnerabilities or install malicious software to create a backdoor, providing an entry point that bypasses security measures.

Botnet

Collection of computers that are infected with small bits of code (bots) that allow a remote computer to control some or all of the functions of the infected machines. Typically used for disreputable purposes, such as denial of service attacks, click fraud, and spam.

C

Clickjacking

A type of attack in which the victim clicks on links on a website they believe to be a known, trusted website. However, they are actually clicking on a malicious, hidden website overlaid onto the known website.

Cross-Site Scripting

An attack performed through web browsers, taking advantage of poorly-written web apps. For example, an attacker can trick a user into clicking on a specially crafted, malicious hyperlink that appears to lead to an innocent site, but the site is actually the attacker's and includes embedded scripts.

Cyber Attack

A cyberattack is a deliberate attempt by an individual or group to compromise another party’s information system. Attackers typically aim to disrupt operations or gain unauthorized access to data for personal or organizational gain.

Read More

M

Malvertising

Online advertisements that contain embedded malware or tricks the user into downloading malware upon reaching the resulting website. Malvertising is usually performed via clickjacking.

Malware

A broad term for any software designed to damage, disrupt, or gain unauthorized access to computers, networks, or data. Includes ransomware, viruses, spyware, and much more. Because malware is constantly evolving and increasingly dangerous, modern cybersecurity requires multi-layered defensive tools that include Zero Trust Network Access, Managed Detection and Response, and Endpoint Detection and Response.

Read More

P

Potentially Unwanted Programs (PUPs)

Programs that are specifically not malware, but they do abnormal actions or are corrupted. The vast majority of PUPs are AutoKMS tools, hacking tools, and adware.

R

Remote Access Trojan (RAT)

A type of malware that grants an attacker covert, administrative-level control over an infected device from a remote location. Acts as backdoors that allow threat actors to maintain persistence on a victim's computer and potentially load other malware or run malicious commands.

S

Signature-Based Detection

Ability to identify threats by comparing system activity to a database of known attack patterns (signatures) to detect malicious behavior. The weakness of signature-based detection is that modern threats mostly rely on techniques that are not recognized by signatures alone.

Social Engineering Attack

An attack that psychologically manipulates people into clicking malicious links, opening infected attachments, or revealing passwords. Particularly effective because it targets the human element, bypassing firewalls and other security mechanisms.

Read More

Spyware

Malicious software that secretly enters your device, gathers your personal information (like passwords, browsing habits, financial details) without your consent, and sends it to third parties.

T

Trojan

An application that appears legitimate but performs malicious actions unbeknown to the user.

Z

Zero-Day

A type of threat that exploits an unknown software vulnerability before the user/developer knows about it or has a patch ready, giving defenders no time to fix it. Also known as a 0-day.