Essential cybersecurity terms and concepts explained in plain language. A reference for San Diego business leaders and IT professionals.
Outsourced cybersecurity service providing 24/7 threat monitoring, detection, and active response by a team of security experts.
Security method requiring two or more verification factors to access accounts, significantly reducing the risk of credential-based attacks.
Payment Card Industry Data Security Standard — security requirements for organizations that store, process, or transmit cardholder data.
Authorized simulated cyberattacks performed to evaluate the security of systems by attempting to exploit vulnerabilities.
Fraudulent communications disguised as legitimate sources to trick victims into revealing credentials, installing malware, or transferring funds.
Educational programs that teach employees to recognize and respond to cybersecurity threats like phishing and social engineering.
Platform that collects, correlates, and analyzes security log data from across an organization to detect threats and support compliance.
Centralized facility where a team of security analysts monitors, detects, and responds to cybersecurity threats around the clock.
Service Organization Control 2 — an auditing framework that evaluates how service providers manage data security, availability, and privacy.
Psychological manipulation techniques used to trick people into revealing information or performing actions that compromise security.
An outsourced Chief Information Security Officer who provides strategic security leadership without the cost of a full-time executive hire.
Systematic review of security weaknesses in systems, networks, and applications to identify and prioritize risks for remediation.
Understanding the terminology is the first step. Let our San Diego team help you implement the right defenses for your business.