Don’t let a lack of understanding stop you from taking action. If you hear a term you don’t know, check out our glossary, or just ask! Simplifying complexity is our strength.
A program that detects, prevents, and removes harmful software like viruses, worms, and trojans from your computer.
The process of verifying someone’s identity before granting access to systems or data—usually with a password, fingerprint, or code.
A copy of data stored separately to protect against loss or damage.
Using internet-based servers to store, manage, and process data instead of relying only on your computer or office servers.
The process of scrambling information so only authorized people with the right “key” can read it.
A security system that blocks or allows network traffic based on set rules, acting like a barrier between your devices and the internet.
Any type of harmful software designed to damage, steal, or disrupt—examples include viruses, ransomware, and spyware.
An extra security step requiring more than just a password—like a code texted to your phone or a fingerprint scan.
A scam where attackers trick people into giving up personal information (like passwords or credit cards) by pretending to be trustworthy, often through fake emails or websites.
Malware that locks your files and demands payment (a “ransom”) to unlock them.
Tricking people into giving away confidential information—like posing as tech support or sending fake alerts
Unwanted or junk emails, often used for advertising or scams.
Malware that secretly collects information about you and your online activity without permission.
A malicious program disguised as something useful or safe, which then allows attackers to access your system.
A service that encrypts your internet connection and hides your online activity, especially useful on public Wi-Fi.
A type of malware that spreads by infecting files or programs, often damaging data in the process.
A weakness in software, hardware, or processes that hackers can exploit.
A type of malware that spreads itself automatically across networks without needing human interaction.
A cyberattack that happens as soon as a new vulnerability is discovered—before a fix or patch is available.