Register today for Zero Trust World 2026!
RESOURCE CENTER

Cybersecurity 101

Comprehensive cybersecurity glossary and resource hub for IT professionals. Understand key terms, frameworks, tools, and concepts shaping today’s threat landscape.

p
Policies

ThreatLocker® policies are the rules or guidelines admins implement to control applications, network activity, external storage access, and what activities to alert on and actions that should be taken in response to them.

Read more
p
Phishing

Phishing is a malicious attempt by a threat actor to convince users to open malicious links or files and is the number one cause of ransomware.

Read more
p
Pharming

A cyberattack that redirects website visitors to a new, malicious website. This site may look exactly like the one the user intended on entering. Pharming sites usually look to steal usernames, passwords, and other PIDs.

Read more
p
Per User Limits

ThreatLocker® provides the ability to create policies that control access to resources per individual user to ensure every user has access to what is necessary for business, and no more than that.

Read more
p
PID (Personal Identifiable Data)

Private and confidential data that can pinpoint exactly who the owner of the data is. Consumers trust organizations will provide the utmost security to protect their data from threat actors looking to compromise and even spread it. PID includes full names, addresses, contact information, social security numbers, bank account information, salaries, and more.

Read more
p
Personal Firewalls

Like Perimeter Firewalls, Personal Firewalls defend a private network from the public internet. The key difference between these two is that Perimeter Firewalls are meant for businesses, organizations, and other large-scale networks, whereas Personal Firewalls are meant for a small network like someone’s home.

Read more
p
Permissions

Also referred to as rights and privileges, permissions are a set level of actions a user can take in their organization’s network. Permissions are usually established by a “higher-level” user with admin rights.

Read more
p
Perimeter Firewall

A security application organizations implement to protect themselves from outside, internet threats. Firewalls act as a barrier of protection that holds a “wall” between the private and public networks.

Read more
p
Patching

Updates to systems, software, hardware, websites, etc. That, as the name implies, patch over known vulnerabilities before they can be exploited by threat actors.

Read more
p
Password Management Tool

A third-party tool that stores, saves, and protects your confidential information like usernames, passwords, and credit card numbers.

Read more
p
PAM (Privileged Access Management)

The ability to manage users’ admin rights within your organization on a timed basis to mitigate risk by giving users the minimum access needed.

Read more
r
Risk management

Risk management in cybersecurity involves identifying threats, assessing their likelihood and impact, and taking steps to mitigate them.

Read more
r
Rubber Ducky

A hacking tool that looks like a USB thumb drive but contains a hidden computer chip that can be programmed to carry out malicious acts such as key logging or code injection.

Read more
r
RMM software

RMM stands for remote monitoring and management. RMM software is used to access computers from a geographical distance to make management and monitoring easier.

Read more
r
Rogue

Unauthorized and/or unknown. A rogue application is an application that is not permitted or known to be in an environment.

Read more
r
Ringfencing ™

An endpoint security tool unique to ThreatLocker® that blocks your applications from communicating with others, proactively defending against the spreading of malicious instructions. Learn More About ThreatLocker® Ringfencing™

Read more
r
Remote Access Attacks

Remote access attacks occur when a threat actor tries to gain unauthorized access to network resources from a geographical distance to carry out malicious acts.

Read more
r
Remote Access

The ability for an authorized user to access a network resource from a geographical distance through a network connection.

Read more
r
Ransomware

Ransomware is malicious software that encrypts your computer, locking you out of confidential files and data until you agree to pay a ransom. Ransomware is deployed in many ways, but perhaps the most common are Phishing Emails and Social Engineering Attacks, exploiting vulnerabilities within your software or system, and malicious advertising.

Read more
r
Ransom

In the computer world, ransom is an amount of money paid to threat actors in exchange for the release of the assets being ransomed, i.e., computer systems, data.

Read more
r
RaaS (Ransomware as a Service)

Business model in which a ransomware organization will develop and launch ransomware in exchange for payment by the party that wishes to target an organization.

Read more
s
Storage Policies

Storage policies are the set of rules that dictate who, what, how, and when electronic storage locations can be accessed.

Read more
s
Storage Control

A ThreatLocker® tool that provides protection for your internal and external data and information storage.

Read more
s
SQL Injection Attacks

An attack in which an attacker interferes with queries to a SQL database. This is most commonly a web security vulnerability and can allow an attacker to view data that they ordinarily would not be able to retrieve. In many cases the attacker can alter this data causing damage to applications and your information.

Read more
s
Software

Software is a computer program or application, the collection of code needed to perform a task.

Read more
s
Shadow Copies

Shadow copies are backup copies of files automatically created by Windows.

Read more
s
Social Engineering

Social engineering is the act of trying to trick users into revealing confidential information that they can use to carry out malicious acts.

Read more
s
Script

A computer script is a series of commands that tell the computer to do something. Useful for automating tasks, scripts are also used by threat actors to carry out malicious acts. Common scripts that you might hear about are batch files or JavaScript files.

Read more
s
Secure Passwords

A secure password is one that is not easily guessed or cracked using a password cracking tool. Choose a nonsensical, long password that combines upper- and lower-case characters with numbers and symbols.

Read more
s
Secure Application Integration

Application Integration is the ability for applications to interact and work with one another. Secure Application Integration is controlling this ability and only permitting interactions that do not put an organization and their data at risk such as preventing MS Word from communicating with PowerShell.

Read more
s
Scareware

A type of phishing attack that uses fear to try and coerce a user into downloading and/or purchasing unnecessary and potentially dangers software.

Read more
s
Spear Phishing

Spear Phishing is a targeted Phishing attempt where a threat actor researches a specific person (usually someone with higher-level admin access to data and programs) and uses what they have learned to create a tailored phishing attempt specifically for that user.

Read more
t
Time-Based Policies

Policies set to take effect during specified periods of time (i.e., specific days of the week, times of day)

Read more
t
Threat Actor

Also known as a cybercriminal, an individual or group of individuals that try to perform actions in the cybersecurity space to purposely cause harm (financial, reputational, or otherwise). Businesses of all sizes and in all verticals can be targeted.

Read more
t
Testing Environment

A separate environment to check application behavior. The ThreatLocker® Testing Environment utilizes a Virtual Desktop Infrastructure (VDI) that enables admins to evaluate approval requests in a timely manner without significantly impacting workflow. With a one-button click within a request to add a new application, a temporary testing environment is created in which it runs the requested application without taking the risk of running an unknown application in a production environment. The VDI creates a cloud-based environment that allows businesses to examine applications safely and determine how best to proceed in real-time.

Read more
t
Targeted Attacks

Any malicious attack against a targeted audience such as a specific software, individual or business. These attackers have generally invested a good deal of time and effort to research and carry out the attack. They may be persistent and attempt to exfiltrate data from the target environment.

Read more
t
Two-Factor Authentication (2FA)

Identity and access management method that requires 2 unique forms of identification to successfully authenticate. Common authentication factors include something you know (password or passcode), something you have (hardware token or cell phone for SMS or OTC), and something you are (fingerprint, face ID). Combine 2 unique factors to create a more secure login such as a password and OTC or face ID and a passcode.

Read more
u
Unified Audit

A unified audit combines multiple logs into a single location. The ThreatLocker® Unified Audit is the central location within the ThreatLocker® portal to view all logged application, storage, and network activity for your organization.

Read more
v
Vulnerability

A vulnerability is a weakness. In the computer world, vulnerabilities are weaknesses in software or hardware that threat actors will try to exploit or take advantage of with malicious intent.

Read more
v
Virtual Private Network (VPN)

A VPN is an encrypted tunnel through which to access network resources for additional security.

Read more
v
Virus

In the computer world, a virus is a computer program that once launched will replicate itself and ‘infect’ the host computer with malicious code, potentially spreading throughout an entire computer network.

Read more
v
Virtual Desktop Infrastructure (VDI)

VDIs are virtual desktops that are centrally hosted and managed. End users can log into the VDI from any location via a secure connection to further protect business data while permitting access to their work data. Physical hardware need not be supplied to employees, and businesses can easily maintain the security of the VDIs using the virtualization platform. The ThreatLocker® Testing Environment uses a VDI where admins can test untrusted applications without risking their critical business production environment.

Read more
w
Weaponization

Weaponization is the act of using something that by itself is not harmful in a malicious manner to inflict harm, I.e., using a Word document to embed a macro that attempts to contact a command and control center on the internet.

Read more
z
Zero Trust

Zero Trust is a cybersecurity philosophy in which nothing (no users, no devices, etc.) is trusted by default, and everything is verified. Instead, all users, applications, network connections will be blocked by default until verified and expressly permitted. Once permitted, users, applications and network connections will only be allowed what is needed to carry out business, and nothing more.

Read more
z
Zero-Day Vulnerabilities

A zero-day attack occurs when the developers are unaware of a vulnerability within a software, device, or network that becomes exploited by threat actors. The vulnerability, in this case, is known as a zero-day vulnerability. These "zero-day" vulnerabilities get their name from developers having zero days to implement responses and solutions for the exploited vulnerability.

Read more
Sort Alphabetically
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.