Register today for Zero Trust World 2026!
RESOURCE CENTER

Cybersecurity 101

Comprehensive cybersecurity glossary and resource hub for IT professionals. Understand key terms, frameworks, tools, and concepts shaping today’s threat landscape.

p
Pharming

A cyberattack that redirects website visitors to a new, malicious website. This site may look exactly like the one the user intended on entering. Pharming sites usually look to steal usernames, passwords, and other PIDs.

Read more
p
Per User Limits

ThreatLocker® provides the ability to create policies that control access to resources per individual user to ensure every user has access to what is necessary for business, and no more than that.

Read more
p
PID (Personal Identifiable Data)

Private and confidential data that can pinpoint exactly who the owner of the data is. Consumers trust organizations will provide the utmost security to protect their data from threat actors looking to compromise and even spread it. PID includes full names, addresses, contact information, social security numbers, bank account information, salaries, and more.

Read more
p
Personal Firewalls

Like Perimeter Firewalls, Personal Firewalls defend a private network from the public internet. The key difference between these two is that Perimeter Firewalls are meant for businesses, organizations, and other large-scale networks, whereas Personal Firewalls are meant for a small network like someone’s home.

Read more
p
Permissions

Also referred to as rights and privileges, permissions are a set level of actions a user can take in their organization’s network. Permissions are usually established by a “higher-level” user with admin rights.

Read more
p
Perimeter Firewall

A security application organizations implement to protect themselves from outside, internet threats. Firewalls act as a barrier of protection that holds a “wall” between the private and public networks.

Read more
p
Patching

Updates to systems, software, hardware, websites, etc. That, as the name implies, patch over known vulnerabilities before they can be exploited by threat actors.

Read more
p
Password Management Tool

A third-party tool that stores, saves, and protects your confidential information like usernames, passwords, and credit card numbers.

Read more
p
PAM (Privileged Access Management)

The ability to manage users’ admin rights within your organization on a timed basis to mitigate risk by giving users the minimum access needed.

Read more
r
Rubber Ducky

A hacking tool that looks like a USB thumb drive but contains a hidden computer chip that can be programmed to carry out malicious acts such as key logging or code injection.

Read more
r
RMM software

RMM stands for remote monitoring and management. RMM software is used to access computers from a geographical distance to make management and monitoring easier.

Read more
r
Rogue

Unauthorized and/or unknown. A rogue application is an application that is not permitted or known to be in an environment.

Read more
r
Ringfencing ™

An endpoint security tool unique to ThreatLocker® that blocks your applications from communicating with others, proactively defending against the spreading of malicious instructions. Learn More About ThreatLocker® Ringfencing™

Read more
r
Remote Access Attacks

Remote access attacks occur when a threat actor tries to gain unauthorized access to network resources from a geographical distance to carry out malicious acts.

Read more
r
Remote Access

The ability for an authorized user to access a network resource from a geographical distance through a network connection.

Read more
r
Ransomware

Ransomware is malicious software that encrypts your computer, locking you out of confidential files and data until you agree to pay a ransom. Ransomware is deployed in many ways, but perhaps the most common are Phishing Emails and Social Engineering Attacks, exploiting vulnerabilities within your software or system, and malicious advertising.

Read more
r
Ransom

In the computer world, ransom is an amount of money paid to threat actors in exchange for the release of the assets being ransomed, i.e., computer systems, data.

Read more
r
RaaS (Ransomware as a Service)

Business model in which a ransomware organization will develop and launch ransomware in exchange for payment by the party that wishes to target an organization.

Read more
s
Storage Policies

Storage policies are the set of rules that dictate who, what, how, and when electronic storage locations can be accessed.

Read more
s
Storage Control

A ThreatLocker® tool that provides protection for your internal and external data and information storage.

Read more
s
SQL Injection Attacks

An attack in which an attacker interferes with queries to a SQL database. This is most commonly a web security vulnerability and can allow an attacker to view data that they ordinarily would not be able to retrieve. In many cases the attacker can alter this data causing damage to applications and your information.

Read more
s
Software

Software is a computer program or application, the collection of code needed to perform a task.

Read more
Sort Alphabetically
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.