fbpx
Mytek Logo
MyTek Logo

Cybersecurity Term Definitions Your Team Should Know

by | Feb 2, 2022 | MyTek Blog, Security

Q

Subscribe To The Blog

By subscribing to the blog, you will be notified when a new blog post is created on the site.

Your team needs to know everything they can about cybersecurity because they are your men and women on the frontlines. When a threat approached, they are the ones who need to know how to handle it. That’s why it is important to educate them about everything they need to know. In today’s article, we are going to discuss some cybersecurity term definitions, so you can teach them about everything and they can know the difference between a “breach” and a “security incident.”

What is a “Data Breach?”

A breach is when your business’ data is accessed by someone outside of the organization, through their efforts. One definition from Trend Micro is “an incident wherein information is stolen or taken from a system without the knowledge or authorization of the system’s owner.” This means that a breach is when data is accessed by an unauthorized user, which is not always necessarily a malicious thing.

What is a “Security Incident?”

This is a blanket term given to any violation of established security policies. And this is also at any scale. A security incident isn’t malicious, but it is always a potential threat.

Here are a few circumstances included:

  • A spam email arriving in an inbox
  • A Distributed Denial of Service attack
  • A misuse of portable storage
  • A malware infection
  • A brute force attack
  • And so much more

Security incidents are often separated by how serious they are. We separate these into high-priority, medium priority and low priority.

Isn’t This Just a Difference in Semantics?

While messing up a few of these terms might not matter too much in the long run, it is important for your team to be on the page so they can effectively articulate what is happening around them. 

Before your team even needs to discuss these threats, MyTek can stop them from coming. Give us a call today at 623-312-2440 to learn more about our solutions and some other cybersecurity term definitions.

ABOUT THE AUTHOR

Tim - Team

Tim Tiller, LMSW

 
Tim Tiller, MSW brings a deep service background to his role at Mytek, having graduated from McDonald’s management training program, fresh out of high school, and working his way up through the ranks in the hospitality industry. He has led two prior companies – Multi-Systems Inc., an IT-focused organization providing technology to hospitality companies (where he was named President at age 36), and most recently, as Chief Operating Officer for Jewish Voice Ministries International.

Q

Subscribe To This Author

By subscribing to the author, you will be notified when a new blog post is created by the author.

AUTHOR’S RECENT POSTS

Types of Mobile Malware & How to Defend Against Them

Malware has a long history of undermining computer security and stealing critical data. With the rapid growth of mobile usage, we're now seeing a new breed of mobile malware infecting smartphones and tablets. The new-age mobile malware are more advanced, seamless, and...

How to Protect Your Data Privacy & Enhance IT Security

Every time you use a device, you enter, modify or access data. Some of your usages are routine and public but sometimes you perform tasks that are confidential in your personal life or business. Naturally, this type of data is private and it should be kept that way....

What to Look for in a Cybersecurity Partner

Cybersecurity in the post-pandemic world is vastly different from what it was a few years back. Enterprises and SMBs are up against more sophisticated, damaging, and resilient attacks that require specialized experts to address, contain and mitigate them in time. If...

Mobile? Grab this Article!

QR Code

Blog Archive

Share This