A cyberattack that redirects website visitors to a new, malicious website. This site may look exactly like the one the user intended on entering. Pharming sites usually look to steal usernames, passwords, and other PIDs.
ThreatLocker® provides the ability to create policies that control access to resources per individual user to ensure every user has access to what is necessary for business, and no more than that.
Private and confidential data that can pinpoint exactly who the owner of the data is. Consumers trust organizations will provide the utmost security to protect their data from threat actors looking to compromise and even spread it. PID includes full names, addresses, contact information, social security numbers, bank account information, salaries, and more.
Like Perimeter Firewalls, Personal Firewalls defend a private network from the public internet. The key difference between these two is that Perimeter Firewalls are meant for businesses, organizations, and other large-scale networks, whereas Personal Firewalls are meant for a small network like someone’s home.
Also referred to as rights and privileges, permissions are a set level of actions a user can take in their organization’s network. Permissions are usually established by a “higher-level” user with admin rights.
A security application organizations implement to protect themselves from outside, internet threats. Firewalls act as a barrier of protection that holds a “wall” between the private and public networks.
Updates to systems, software, hardware, websites, etc. That, as the name implies, patch over known vulnerabilities before they can be exploited by threat actors.
A third-party tool that stores, saves, and protects your confidential information like usernames, passwords, and credit card numbers.
The ability to manage users’ admin rights within your organization on a timed basis to mitigate risk by giving users the minimum access needed.
A hacking tool that looks like a USB thumb drive but contains a hidden computer chip that can be programmed to carry out malicious acts such as key logging or code injection.
RMM stands for remote monitoring and management. RMM software is used to access computers from a geographical distance to make management and monitoring easier.
Unauthorized and/or unknown. A rogue application is an application that is not permitted or known to be in an environment.
An endpoint security tool unique to ThreatLocker® that blocks your applications from communicating with others, proactively defending against the spreading of malicious instructions. Learn More About ThreatLocker® Ringfencing™
Remote access attacks occur when a threat actor tries to gain unauthorized access to network resources from a geographical distance to carry out malicious acts.
The ability for an authorized user to access a network resource from a geographical distance through a network connection.
Ransomware is malicious software that encrypts your computer, locking you out of confidential files and data until you agree to pay a ransom. Ransomware is deployed in many ways, but perhaps the most common are Phishing Emails and Social Engineering Attacks, exploiting vulnerabilities within your software or system, and malicious advertising.
In the computer world, ransom is an amount of money paid to threat actors in exchange for the release of the assets being ransomed, i.e., computer systems, data.
Business model in which a ransomware organization will develop and launch ransomware in exchange for payment by the party that wishes to target an organization.
Storage policies are the set of rules that dictate who, what, how, and when electronic storage locations can be accessed.
A ThreatLocker® tool that provides protection for your internal and external data and information storage.
An attack in which an attacker interferes with queries to a SQL database. This is most commonly a web security vulnerability and can allow an attacker to view data that they ordinarily would not be able to retrieve. In many cases the attacker can alter this data causing damage to applications and your information.
Software is a computer program or application, the collection of code needed to perform a task.