Protected Health Information (PHI) is any identifying material that relates to an individual’s past, present or future health.| Bora
Data privacy is the process of safeguarding an individual’s personal information, ensuring it remains confidential, secure, and protected from unauthorized access or misuse.| Bora
The Domain Name System (DNS) is a critical component of the internet, functioning like a phone book for the digital world.| Bora
Business Email Compromise (BEC) is a cyberattack where hackers access business emails using social engineering or phishing.| Bora
Data protection refers to the practice of safeguarding sensitive information from unauthorized access, disclosure, alteration, or destruction.| Bora
Skimming devices are illicit tools used to capture data from magnetic stripe cards, allowing criminals to clone or misuse card information for fraudulent purposes.| Bora
Phishing-resistant MFA is a mechanism that prevents attacks from attempting to compromise or subvert the login process.| Bora
IoT, or Internet of Things, refers to interconnected devices, equipped with sensors and software enabling them to collect and exchange data.| Bora
Biometric authentication uses human body measurements and characteristics to identify users in order to allow access to a system.| Bora
Access management is the umbrella term for the solutions, policies, and tools used to control digital access to an enterprise IT environment.| Bora
A cyberattack is a deliberate and malicious attempt to exploit vulnerabilities in computer systems, networks, or software applications to cause damage, steal information, disrupt services, or gain unauthorized access.| Bora
Critical infrastructure refers to the systems, assets, and facilities that are essential for the functioning of a society and its economy.| Bora
Encryption converts readable data (plaintext) into a scrambled and unreadable format (ciphertext) using an algorithm and a key.| Bora
Regulatory compliance refers to the act of adhering to the laws, directives, and requirements set by governmental bodies and industry authorities that pertain to a specific industry, sector, or business activity.| Bora
The General Data Protection Regulation (GDPR) is a set of privacy and security standards enacted by the European Union (EU).| Bora
Social engineering is a tactic cybercriminals use to trick individuals into revealing confidential information or compromising security.| Bora
Phishing is a type of cyberattack in which attackers send fraudulent communications, or direct people to counterfeit websites in order to trick those individuals into revealing sensitive information.| Bora
Multi-factor Authentication (MFA) is a robust security method that enhances digital identity verification by requiring users to provide multiple authentication mechanisms before gaining access to a system, account, or application.| Bora
Identity theft is a type of fraud in which an individual's personal and sensitive information is stolen and used by someone else without the former's permission or knowledge.| Bora
Authentication verifies a user or system's identity, confirming that the entity seeking access to a resource is genuine.| Bora
Ransomware is a type of cyberattack in which the attacker infects a computer with malicious software that encrypts the victim's data.| Bora
Employee advocacy is a marketing technique whereby an organization's staff act as spokespeople for the brand.| Bora
Quantum computing is a cutting-edge field that leverages the principles of modern physics to perform operations significantly faster than classical computers.| Bora
Machine learning is a subset of Artificial Intelligence (AI) that involves the development of algorithms and models that enable computers to make predictions or decisions based on data without being explicitly programmed.| Bora
Generative AI is a subset of artificial intelligence that focuses on creating new content by producing new data that mimics the training data| Bora
Artificial Intelligence (AI) refers to computer systems that aim to replicate or surpass human cognitive functions in various domains.| Bora