See What Foreign Software Is Running in Your Environment
RESOURCE CENTER

Cybersecurity 101

p
PID (Personal Identifiable Data)

Private and confidential data that can pinpoint exactly who the owner of the data is. Consumers trust organizations will provide the utmost security to protect their data from threat actors looking to compromise and even spread it. PID includes full names, addresses, contact information, social security numbers, bank account information, salaries, and more.

p
Per User Limits

ThreatLocker® provides the ability to create policies that control access to resources per individual user to ensure every user has access to what is necessary for business, and no more than that.

p
Pharming

A cyberattack that redirects website visitors to a new, malicious website. This site may look exactly like the one the user intended on entering. Pharming sites usually look to steal usernames, passwords, and other PIDs.

p
Phishing

Phishing is a malicious attempt by a threat actor to convince users to open malicious links or files and is the number one cause of ransomware.

p
Policies

ThreatLocker® policies are the rules or guidelines admins implement to control applications, network activity, external storage access, and what activities to alert on and actions that should be taken in response to them.

p
Pop-up

A window that appears on top of another window on a computer screen without warning.

p
Port Control

Port Control is the ability to control network traffic at the port level, opening and closing ports.

p
PowerShell

Built into Windows, PowerShell is a programming language and shell that is used to automate tasks. Hackers commonly abuse PowerShell by using it to inject malicious code into memory to avoid detection by traditional antivirus software.

p
PSA

PSA stands for professional services automation. In IT, a PSA system is used to manage teams, including tracking tickets to ensure tasks are completed.

q
q
r
r
r
RaaS (Ransomware as a Service)

Business model in which a ransomware organization will develop and launch ransomware in exchange for payment by the party that wishes to target an organization.

r
Ransom

In the computer world, ransom is an amount of money paid to threat actors in exchange for the release of the assets being ransomed, i.e., computer systems, data.

r
Ransomware

Ransomware is malicious software that encrypts your computer, locking you out of confidential files and data until you agree to pay a ransom. Ransomware is deployed in many ways, but perhaps the most common are Phishing Emails and Social Engineering Attacks, exploiting vulnerabilities within your software or system, and malicious advertising.

r
Remote Access

The ability for an authorized user to access a network resource from a geographical distance through a network connection.

r
Remote Access Attacks

Remote access attacks occur when a threat actor tries to gain unauthorized access to network resources from a geographical distance to carry out malicious acts.

r
Ringfencing ™

An endpoint security tool unique to ThreatLocker® that blocks your applications from communicating with others, proactively defending against the spreading of malicious instructions. Learn More About ThreatLocker® Ringfencing™

r
Rogue

Unauthorized and/or unknown. A rogue application is an application that is not permitted or known to be in an environment.

r
RMM software

RMM stands for remote monitoring and management. RMM software is used to access computers from a geographical distance to make management and monitoring easier.

r
Rubber Ducky

A hacking tool that looks like a USB thumb drive but contains a hidden computer chip that can be programmed to carry out malicious acts such as key logging or code injection.

s
s
s
Spear Phishing

Spear Phishing is a targeted Phishing attempt where a threat actor researches a specific person (usually someone with higher-level admin access to data and programs) and uses what they have learned to create a tailored phishing attempt specifically for that user.

s
Scareware

A type of phishing attack that uses fear to try and coerce a user into downloading and/or purchasing unnecessary and potentially dangers software.

s
Secure Application Integration

Application Integration is the ability for applications to interact and work with one another. Secure Application Integration is controlling this ability and only permitting interactions that do not put an organization and their data at risk such as preventing MS Word from communicating with PowerShell.

s
Secure Passwords

A secure password is one that is not easily guessed or cracked using a password cracking tool. Choose a nonsensical, long password that combines upper- and lower-case characters with numbers and symbols.

Sort Alphabetically
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.