Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Password Cracking

Also referred to as Password Hacking; The process in which bad actors go through to hack, or get into computer systems illegally, in order to steal, corrupt, or illegitimately view personal data; in this case, by cracking passwords.

Personally Identifiable Information (PII)

This is the qualification for any personal data, including usernames, email addresses, social security numbers, credit card numbers, HIPAA information, and even data processors or solutions, all of which is protected data under the EU's GDPR law.

Phishing

Phishing is when an attacker mimics a trusted person or brand in an attempt to steal sensitive information or gain a foothold inside a company network. 

Phishing Simulation

This is a cybersecurity exercise that simulates a phishing attack for employees or users and tests to see if they can recognize and respond to it appropriately.

Post-delivery

This is when emails bypass legacy security defenses and don't get scanned or detected until AFTER they have delivered to an exchange server, often leading to inbox delivery.

Pre-delivery

This describes when emails are scanned and detected BEFORE they get to the network exchange, which minimizes the time they are open to vulnerabilities and decreases cyber risk.