Verifying the identity of a user or process.
A file containing a collection of audit events.
An audit event refers to any security relevant occurrence within a system.
A software designed to hunt and remove viruses from your device(s) or block viruses from entering in the first place.
Occur when cyber threat actors take advantage of any vulnerabilities within an application, usually to enter your devices or organization.
An Application Definition is the set of files and any custom rules that make up a particular application.
When an application is running in an environment, it has access to everything in that environment, such as sensitive files, and on networked devices, this includes everything on the network.
Software that allows you to perform a specific function on your desktop or mobile devices. Applications can include word processors, internet browsers, and media players.
Historically referred to as whitelisting, Allowlisting is a ThreatLocker endpoint security module that blocks all applications from operating unless explicitly permitted.
Learn More About Application Allowlisting
A specific set of instructions a computer must follow to perform a calculation or solve a problem.
A barrier between an organization’s digital assets and the internet or other networks.
A computer program that carries out a task in the background.
The highest level of privileges a user has in the operating system (OS) of an organization; usually allowed to perform most or all functions.
A list of permissions used to control network traffic.
Refers to a policy that allows employees within an organization to use their personal devices to connect to the organizations’ networks. The device is used to complete tasks necessary to complete their job which can potentially be sensitive or confidential.
Tools that are included in the basic platform functionality without any modifications.
Short for “Data Back Up,” a Back Up is a method of saving your devices’ data in a different online or offsite location.
Currency that exists digitally/virtually. Many ransomware attacks demand cryptocurrency payments, in Bitcoin for example, because it is decentralized and untraceable.
Anything with the ability to harm an individual or organization from an online source. Threats may damage or disrupt normal operations with malicious intents to cause destruction or financial loss.
As the US DoD explains, the CMMC is designed to enforce protection of sensitive unclassified information that is shared by the Department with its contractors and subcontractors. The program provides the Department increased assurance that contractors and subcontractors are meeting the cybersecurity requirements that apply to acquisition programs and systems that process controlled unclassified information.
The defensive approach one takes to protect their data stores or information systems from online threats like ransomware.
Cybercriminals are anyone who makes the attempt to initiate a cyberattack on another individual or organization, also known as threat actors.