Cybersecurity 101

In today’s digital world, cybersecurity is essential. At WatchGuard, we break down key cybersecurity topics with clear explanations, practical examples, and proven best practices. Whether you want to learn about network security, endpoint protection, identity management, or cyber threats—start your journey with Cybersecurity 101.

C

Credential Stuffing

An attack that uses stolen username and password combinations from previous data breaches to attempt logins into other services. Since many people reuse passwords, attackers run automated tools that test millions of credential pairs against target websites.

D

Dark Web

A hidden part of the Internet requiring special browsers like Tor to access. Designed for user anonymity through onion routing, used for both legitimate purposes (privacy, anti-censorship) and illicit activities (black markets, illegal services).

Dark Web Credential Monitoring

Tools that can scan stealer logs, criminal forums, and third-party breaches on the dark web for your organization's exposed passwords. By providing visibility into exposed corporate credentials, it enables faster response and risk mitigation.

Dark Web Monitoring

A process of continually scanning the dark web to identify compromised, stolen, or leaked data. This can include intellectual property, credentials, and personal information.

O

OIDC Security

Stands for OpenID Connect protocol. An identity authentication protocol used to enable two unrelated applications to share user profile information without compromising user credentials.

P

Passkey

A passwordless authentication standard that allows users to sign in to apps and websites using biometrics (fingerprint, face scan) or a device PIN instead of a password. Gives MSPs a way to offer phishing-proof authentication. Passkeys work like unlocking your phone, the same fingerprint or face, but now also for logging into apps. No password to forget. No code to intercept. And fake websites simply can't trick it.

V

VPN (Virtual Private Network)

Stands for Virtual Private Network. Provides security benefits of a private, dedicated, leased-line network without the cost of owning one. Uses cryptography to make data unreadable over the Internet. Commonly used to connect multiple company locations. Weakness of VPN is that it allows access with just a username and password. If a password is leaked, your systems are open. Zero Trust Network Access (ZTNA)is a modern alternative to VPNs.

Read More