This glossary is part of our commitment to empowering you with the knowledge and tools necessary for robust security and compliance protection. We have designed this guide to enhance your understanding and empower you to make informed decisions in safeguarding your digital environment.

Cybersecurity Threats and Attacks

Learn about various forms of digital threats and attacks, ranging from sophisticated phishing scams to advanced corporate espionage. Understanding these terms is vital for identifying potential risks and implementing effective security measures to protect your organization from malicious actors.

Group 21Baiting

Luring victims with the promise of goods or services to steal information or infect systems with malware.

Marketing_Dark 1Big Game Hunting

Targeting large organizations for significant financial gain through ransomware or other cyber attacks.

Respond_DarkBusiness Communications Compromise (BCC)

Similar to Business Email Compromise ( BEC), but involves compromising legitimate business communication applications like Slack, Microsoft Teams, WhatsApp, Telegram in addition to email accounts for unauthorized transactions.

Business Email Compromise (BEC)Business Email Compromise (BEC)

A sophisticated scam targeting businesses to transfer funds to the attacker's account.

Copy of BrandDamage_Dark 1Corporate Espionage

Spying is conducted for commercial purposes, often involving cyber tactics.

Malicious_Dark 1Crypto-malware

A form of malware that encrypts files on a computer and demands a ransom in cryptocurrency.

Laptop_DarkDoxware/Leakware

Malware that threatens to publish stolen information from a computer unless a ransom is paid.

Group 17Extortion

Threatening to harm a person or their reputation unless a demand (usually monetary) is met.

Impersonation_Dark 1Honey Trap

A deceptive practice of using romantic or sexual attraction to extract information or concessions.

Discovery_Dark 1Indicators of Attack

Signs or activities suggesting a network or system is under cyber attack.

Security_Dark 1Lockers

A type of ransomware that locks users out of their operating systems, making it impossible to access their desktop and files.

Web_Dark 1Pharming

Redirecting users from legitimate websites to fraudulent ones for the purpose of extracting confidential data.

Phishing_Dark 1Phishing

A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.

Messaging_Dark 1Pretexting

The act of creating a fabricated scenario to steal a victim's personal information.

Laptop_DarkQuid Pro Quo

Offering a benefit in exchange for information, often used in social engineering attacks.

DDOS_Dark_CMYK 1RaaS (Ransomware as a Service)

A business model where malware creators sell or rent ransomware to other criminals.

Group-2Ransomware/Malware

Malicious software that encrypts a victim's data and demands payment for its release.

WebSurface_Dark 1Rogue Security Software

Malware that tricks users into believing their computer is infected with a virus, then suggests downloading and paying for fake antivirus software.

Export_Dark 1Scareware

A type of malware designed to trick victims into buying and downloading unnecessary and potentially harmful software.

Social_Dark 2Smishing

SMS phishing, a form of phishing involving text messages.

Credentials_Dark-3Social Engineering

Manipulating individuals into divulging confidential information.

Content_Dark 1-1Social Media Phishing

Phishing attacks carried out through social media platforms.

SpearPhishing_Dark-1Spear Phishing

A more targeted form of phishing, where attackers focus on specific individuals or organizations.

Mobile_DarkVishing

Voice phishing where fraud is committed using telephone calls.

API-Wave_Dark 1Watering Hole

A cyber attack strategy where the attacker guesses or observes which websites an organization often uses and infects them with malware.

AccountCompromise_Dark 1Whaling

A type of spear phishing targeting high-profile individuals like C-level executives.

spacing-1

Cybersecurity Solutions and Strategies

Examine an array of solutions and strategies employed to combat digital threats. This section covers everything from advanced AI technologies to comprehensive security models, offering insights into the tools and methodologies that fortify digital defenses.

Servers_Dark (1) 1Archiving

Storing data securely for long-term retention and compliance purposes.

Investigation_Dark 1Behavioral Analysis

Monitoring and analyzing user behavior to detect anomalies that may indicate security threats.

Group-3Causal AI

Causal artificial intelligence (AI) identifies and utilizes cause-and-effect relationships to go beyond correlation-based predictive models and toward AI systems that can prescribe actions more effectively and act more autonomously. It includes different techniques, such as causal graphs and simulation, that help uncover causal relationships to improve decision making.

Review_Dark 1Compliance

Ensuring that organizational practices meet regulatory and legal requirements.

Group-3Contextual AI

Artificial intelligence that understands the context of data and user interactions for better threat detection.

Reporting and AnalyticsContextual Analysis

Examining the context surrounding data and events to identify security threats.

ML_Dark 1Cross-Channel Event Correlation

Analyzing events across different communication channels to detect security incidents.

Protect_Dark 1Data Loss Protection (DLP)

Strategies and tools to prevent data breaches and unauthorized access or use of data.

ComplianceProtect_Dark 1Deployment Model

The method of implementing cybersecurity solutions in an organization.

Cyber_DarkGenerative AI

AI capable of generating new content, often used in cybersecurity to simulate attacks or predict threats.

SafeguardMe_Dark_RGB 1Illuminate Partner Program

A partnership program by SafeGuard Cyber, focusing on enhancing cybersecurity measures.

Financial_Dark 1Impact Analysis

Assessing the potential consequences of identified cybersecurity threats.

Impersonation_Dark (1) 1Impersonation

Detecting and preventing attempts to mimic or assume the identity of legitimate users or entities.

Cloud_Dark 1Integrated Cloud Communication Security

Security measures designed to protect cloud-based communication platforms.

Phishing_Dark 2Integrated Cloud Email Security

Protecting email communications within cloud environments from threats.

Respond_Dark 1LLMs (Large Language Models)

Advanced AI models capable of understanding and generating human-like text.

Performance and LatencyMagnitude of Impact

A metric used in cybersecurity to evaluate the potential severity and consequences of a security threat, aiding in prioritizing responses.

Language_Dark-1Multilingual Natural Language Processing (NLP)

AI technology that processes and understands multiple languages for security analysis.

Referral_Dark 1Natural Language Understanding (NLU)

AI's ability to understand and interpret human language.

Platform_Dark 1Ontological Architecture

A framework for modeling data that defines the relationships between different entities.

Remediation_Dark 1Remediation

The process of fixing vulnerabilities or mitigating threats in a cybersecurity context.

Web_Dark (1) 1SaaS (Software as a Service)

A software distribution model where applications are hosted by a service provider and made available over the internet.

Compliance_DarkSecurity

Measures and strategies to protect digital information and IT infrastructure.

Compliance-NextGen_Dark_RGB 1Social Knowledge Graphs

Using network theory to understand and analyze social connections for threat detection.

Visibility_Dark-3Unified Visibility

A comprehensive view of AI cloud communication activities to identify and manage threats.

Profile_Dark 1Vision and Voice

Community led by SafeGuard Cyber CMO, Lisa Hayashi with the goal of helping women ascend in the cybersecurity industry.

Cyber_Dark-1XDR (Extended Detection and Response)

A security solution that provides comprehensive threat detection and response across networks, endpoints, and clouds.

Suspicious_Dark-3Zero Trust

A security model that requires strict identity verification for every person and device trying to access resources.

spacing-1

Compliance Terms

Compliance is a critical aspect of digital security, especially for organizations in regulated industries. Get clarity on terms related to regulatory requirements, policy governance, and risk management, ensuring your organization's digital practices align with legal standards.

Multi Tools_Dark_CMYK 1Archive Communications

Securely storing digital communications, like emails and social media posts, to meet regulatory requirements.

Policy_Dark 1Automated Policy Supervision

Providing comprehensive, automated policy supervision to address various compliance requirements.

Credentials_Dark 1Automated Supervision

Using automated tools for monitoring digital communications to ensure policy and regulatory compliance.

ComplianceDoc_Dark 1Compliance Automation

Automating processes and controls to ensure adherence to regulatory and legal requirements, especially in digital communications and social media.

Securitities_Dark_RGB 1Compliance for Financial Services

Ensuring digital communication strategies in finance comply with regulations like those from the SEC or FINRA.

Social Selling_Dark_RGB 1Compliance for Mobile Chat Communications

Applying compliance measures to mobile chat platforms to meet regulatory standards.

Revenue_Dark_RGB 1Compliant Social Selling

Using social media for sales while adhering to regulatory and compliance standards.

ComplianceProtect_Dark-2Modern Digital Compliance

A contemporary approach to compliance, focusing on consistent policy supervision across digital channels.

Technology_Dark 1Multichannel Analysis and Archiving

Archiving and analyzing content across digital channels in native formats for audit and litigation readiness.

Policy_Dark 1-1Policy-based Governance

Implementing and enforcing policies governing digital communication tools to maintain industry compliance.

IaaS-SaaS-PaaS_Dark 1Regulatory Risk Management

Identifying, assessing, and mitigating risks from changes in laws and regulations, particularly in digital communications.

Machine_Dark 1Transparent Machine Learning

Utilizing machine learning to reduce false positives in compliance monitoring and supervision.

Risk_Dark 1Unified Visibility for Scale

Ensuring security and compliance for business needs across various languages and channels.

spacing-1

Data and Analysis Techniques

Data is at the heart of digital security. This category sheds light on the analytical techniques used to interpret and leverage data for enhanced security, from behavior analytics to machine learning.

User_Dark 1Behavior Analytics

Analyzing data about how users behave across cloud communication channels to detect potential security threats.

Cyber_Dark 2Machine Learning

A type of AI that allows software applications to become more accurate at predicting outcomes without being explicitly programmed to do so.

Data_Dark 1Metadata Traits

Characteristics and data that describe other data, providing context or summarizing basic information.

g8Semantic Analysis

The process of understanding the meaning and interpretation of words and sentences in context.

Attacker_Dark 2Social Graph Analysis

Examining the networks of social relationships to understand behaviors and trends.

spacing-1

Insider Threats and Data Protection

Understanding the internal risks to your organization is as important as external threats. This section focuses on the challenges of insider threats and the importance of robust data privacy measures.

Group-4Credential Theft

The unauthorized acquisition of usernames and passwords to gain access to systems and data.

DLP-DataLossPrevention_Dark 1Data Privacy

Protecting personal or sensitive information from unauthorized access and ensuring its proper handling.

Insider_Dark-3Insider Threats

Security risks that originate from within an organization, often by employees or former employees.

spacing-1

Marketing and Sales

In the digital age, marketing and sales strategies are increasingly intertwined with cybersecurity and compliance. Get insights into how digital tools and platforms can be leveraged safely and effectively in these domains.

Collaboration_Dark 1Collaboration

Working jointly with others, often using digital tools, to achieve business objectives.

Web_Dark-1CRM Free Text

Unstructured text data in a Customer Relationship Management system, often analyzed for insights into customer interactions.

FrameMobile Messaging

Communicating with customers or prospects through mobile text messaging platforms.


Non Traditional Lenders_Dark_RGB 1Social Selling

Using social media platforms to interact directly with prospects, providing value by answering questions and offering thoughtful content.

spacing-1
Image

The Changing Nature of Work

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.

Text

Secure Infrastructures
Text
Secure_Dark

Flexible work environments require access to on-premises systems and data, and therefore most enterprises rely on employees using a VPN. However, organizations can’t trust that workers will always use these secure channels. If an employee is using a mobile phone, he or she might forget to use the VPN and employ an unsecured wireless network instead, exposing corporate systems and data to risk.

During the pandemic, threat actors realized that insecure home networks and a lack of security controls typically found on corporate networks could work to their benefit. The World Economic Forum estimates cyber attacks jumped 238% globally between February and April 2020.

Technical Requirements

Technical Requirements

NEW ROLE OF THE CISO
 
Over 80% of security professionals believe social media, mobile messaging, or collaboration apps present medium to high risks to their organization.

SafeGuardCyber Survey April, 2019

Executive
Secure Infrastructures

Flexible work environments require access to on-premises systems and data, and therefore most enterprises rely on employees using a VPN. However, organizations can’t trust that workers will always use these secure channels. If an employee is using a mobile phone, he or she might forget to use the VPN and employ an unsecured wireless network instead, exposing corporate systems and data to risk.

During the pandemic, threat actors realized that insecure home networks and a lack of security controls typically found on corporate networks could work to their benefit. The World Economic Forum estimates cyber attacks jumped 238% globally between February and April 2020.

Text

ComplianceProtect_Light
Secure_DarkSecure Infrastructures
 

Flexible work environments require access to on-premises systems and data, and therefore most enterprises rely on employees using a VPN. However, organizations can’t trust that workers will always use these secure channels. If an employee is using a mobile phone, he or she might forget to use the VPN and employ an unsecured wireless network instead, exposing corporate systems and data to risk.

During the pandemic, threat actors realized that insecure home networks and a lack of security controls typically found on corporate networks could work to their benefit. The World Economic Forum estimates cyber attacks jumped 238% globally between February and April 2020.

 

Collaboration_DarkCollaboration and Communications Applications
 

Organizations also increasingly rely on cloud-based collaboration platforms and personal communications technologies to connect teams across regions and time zones.

With the sudden onset of the pandemic, many organizations abruptly switched to remote work and found themselves having to allow technologies like MS Teams, Slack, Zoom and Webex on a scale they were uncomfortable permitting earlier. At the time, many IT leaders believed these solutions would be temporary and they’d quickly go back to "normal."

Now, more than a year later, not only are organizations continuing to use these technologies, but they’re doubling down. Yet, they still have no way to keep these systems secure from third-party risks. For example, a recent attack against EA Games involved infiltrating the company’s Slack instance and launching a fileless social engineering scheme to gain access to the network, resulting in the theft and exfiltration of highly-valuable intellectual property.

 

Referral_DarkCommunications Solutions
 

Similarly, IT once viewed communications solutions like WhatsApp and WeChat as personal apps. Because corporate teams had zero visibility into them, they would not allow employees to do business on them. But in some critical emerging markets, only a small percentage of people use email. Most use mobile chat applications like WhatsApp. It has become a business imperative to use the local technology.

 

New Security Challenges

These collaboration and communications tools present significant data governance and security challenges for large organizations. In a survey by SafeGuard Cyber:

  • 78% of cybersecurity leaders express an inability to protect all communication channels and digital assets6
  • 46% say collaboration tools represent the biggest security challenge
  • 1 in 3 say their biggest challenge is mobile chat apps, WhatsApp, WeChat, Telegram
  • 1 in 5 say their biggest challenge is Video meetings (Zoom, Webex, etc. )

Hybrid work environments will only increase the challenges. As employee devices and laptops move onto the corporate network and then back home where they can be exposed to hackers and more easily infected with malware and ransomware, it will be difficult for security teams to protect employees from threats, detect and respond to insider threats, or stop malware and ransomware.

spacing-1
BECOME A ROLE MODEL FOR EXECUTIVE DIGITAL TRANSFORMATION

Only 20% of security professionals feel confident they are effectively mitigating the digital risks from social media, messaging and collaboration apps.
 

SafeGuardCyber Survey April, 2019

Executive
BUILDING ENGAGEMENT ACROSS LEADERSHIP TEAMS
 
35% of businesses provide verbal guidance or in-person training, on the potential risks of using third party apps in a business context.
 

SafeGuardCyber Survey April, 2019

Executive
image-web
BUILDING ENGAGEMENT ACROSS LEADERSHIP TEAMS
 
35% of businesses provide verbal guidance or in-person training, on the potential risks of using third party apps in a business context.
 

SafeGuardCyber Survey April, 2019

Executive
LEAD BUSINESS CHANGE WITH STRATEGIC PLANNING
 
Only 31% of organizations have a documented process for requesting a new app to be added to the approved list.
 

SafeGuardCyber Survey April, 2019

Executive

Lorem ipsum dolor

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nulla urna massa, maximus at neque vel, mollis efficitur.

Benefits

With SafeGuard Cyber’s agentless architecture, organizations benefit from:

 

Visibility_Dark-1Faster MTTD/R
 

Gain unprecedented visibility to respond to internal and external threats in hard-to-see places like direct messages and group channels. Reduce detection and response times in the cloud infrastructure where work gets done.

 
Insider_DarkRapid Time to Value
 

Be up and running in hours not days. Organizations no longer have to configure agents.

 
Protect_DarkIntegrated Defense
 

Connect our agentless security platform into your existing cyber defense systems, feeding event data and telemetry into your EDR and SIEM solutions.

Image
Secure Human Connections

Ready to see how SafeGuard Cyber secures modern communication apps wherever they exist?