{"id":532,"date":"2023-03-24T18:39:23","date_gmt":"2023-03-25T00:39:23","guid":{"rendered":"https:\/\/staging.datcomllc.com\/?page_id=532"},"modified":"2023-03-27T10:03:35","modified_gmt":"2023-03-27T16:03:35","slug":"it-threat-glossary","status":"publish","type":"page","link":"https:\/\/staging.datcomllc.com\/index.php\/understanding-it\/it-threat-glossary\/","title":{"rendered":"IT Threat Glossary"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;2_3,1_3&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;Text &#8211; Experience painless support&#8221; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; content_last_edited=&#8221;on|phone&#8221; sticky_enabled=&#8221;0&#8243; content_phone=&#8221;<\/p>\n<h1><span style=%22color: #008000;%22>IT Threat Glossary<\/span><\/h1>\n<p>&nbsp;<\/p>\n<h2>Stay Updated on Cyber Threats for 2021 and Beyond<\/h2>\n<p><img src=%22https:\/\/staging.datcomllc.com\/wp-content\/uploads\/2023\/03\/it_threats-150x150.png%22 width=%22150%22 height=%22150%22 alt=%22%22 class=%22wp-image-457 aligncenter size-thumbnail%22 \/><\/p>\n<p>The rapid digital transformation of society over the last few years has given hackers more ways\u00a0to engage in cyberattacks against our technology infrastructure and the ordinary people who use it every day.\u00a0 Fortunately, we are taking advantage of advanced tools and methods to protect our clients against every IT threat.<\/p>\n<p>New types of malware, ransomware, and viruses are being created every day, for the express purpose of seeing your organization fail. If your business isn\u2019t using comprehensive security solutions, you remain vulnerable to threats that can potentially compromise and damage your business\u2019s IT infrastructure.<\/p>\n<p>To help make cybersecurity easier for you, we\u2019ve compiled a list of threats that your business should be prepared to face.<\/p>\n<p><strong>Advanced Persistent Threat (APT)<\/strong>: An APT is a stealthy network breach that\u2019s designed to remain undetected for a certain amount of time. APTs are usually used to steal information from a specific individual or organization over time, rather than cause an immediate disruption to operations.<\/p>\n<p><strong>Adware<\/strong>: Adware automatically displays ads on software, particularly web browsers, in an effort to generate revenue for its creator. Adware can often come packaged with free online software, and while it\u2019s not immediately threatening, it can become a severe annoyance and potential security threat. When used as malware, adware can display unwanted (and often embarrassing) advertisements in the form of popups or web ads.<\/p>\n<p><strong>Botnet<\/strong>: A botnet is a collective term used for a network of devices built from \u201cbots,\u201d which are computers controlled remotely by a hacker. Botnets are typically used to complete repetitive tasks, like sending spam messages or participating in Distributed Denial of Service (DDoS) attacks. Due to botnets spreading their infection to other computers, they\u2019re often likened to a \u201czombie horde.\u201d<\/p>\n<p><strong>Brute-force Attacks<\/strong>: Brute-force attacks are commonly used tactics to break into online accounts, particularly those that take advantage of encryption. A brute-force attack consists of the hacker rapidly inputting as many passwords as possible in an attempt to find the right combination of characters.<\/p>\n<p><strong>Command and Control Server<\/strong>: A command and control server (C&amp;C server) is the central computer that remotely issues commands to botnets and other malware. These botnets and malware will then send information back to the C&amp;C server, like sensitive data or account credentials.<\/p>\n<p><strong>Dictionary Attack<\/strong>: Dictionary attacks utilize known words or phrases in an attempt to crack through passwords and usernames. They can be used in conjunction with brute-force attacks to guess credentials and infiltrate accounts.<\/p>\n<p><strong>Distributed Denial of Service (DDoS)<\/strong>: A DDoS attack consists of multiple systems from varied locations target a single system. The resulting traffic is usually an attempt to bring down a server, forcing it offline until the attack ceases. DDoS attacks are often performed by botnets, compromised computers that have been enslaved by hackers to do their bidding.<\/p>\n<p><strong>Exploit<\/strong>: A loose definition would be a tool designed for use in exploiting a specific vulnerability within an IT system component, usually for the purpose of stealing data or installing malicious software.<\/p>\n<p><strong>Keylogging<\/strong>: A keylogger could be either a software or a hardware that\u2019s designed to capture and record keystrokes. Software versions of keyloggers are often included in viruses or malware packages to capture credentials for later use. The victim is typically unaware that their activities are being monitored.<\/p>\n<p><strong>Malware<\/strong>: Malware, derived from \u201cmalicious software,\u201d is a term used to describe any cyber threat that is intrusive and malicious in nature. This can include any number of online threats, including computer viruses, trojans, ransomware, spyware, and others. Malware is usually activated through the use of executable code or scripts. Basically, anything that has malicious intent can be considered malware.<\/p>\n<p><strong>Phishing<\/strong>: Phishing tactics are used by hackers to lure targets into handing over sensitive credentials, like usernames, passwords, credit card numbers, Social Security numbers, and so on, usually through email spam tactics or other electronic means. Phishing tactics will often masquerade as a trusting or intimidating entity.<\/p>\n<p><strong>Ransomware<\/strong>: Ransomware is a type of malware that attempts to extort money or credentials from users by locking down local files on their PC or workstation, usually through the use of encryption technology. The user may (or may not) receive the decryption key upon giving in to the hacker\u2019s demands.<\/p>\n<p><strong>Social Engineering<\/strong>: Social engineering is a tactic used by hackers that appeals to the weaknesses of the end-user. They are particularly dangerous when people are using<span>\u00a0<\/span><a href=%22https:\/\/auth0.com\/blog\/the-9-most-common-security-threats-to-mobile-devices-in-2021\/%22>mobile devices<\/a><span>\u00a0<\/span>when they aren&#8217;t focused on work. Hackers find ways to circumvent common security protocol by posing as important officials or users within a company, or even as an internal IT department. Social engineering tactics are cause for concern primarily because they target the unpredictable nature of human activity.<\/p>\n<p><strong>Spam<\/strong>: Spam is mostly known as the time-wasting emails that users receive on a daily basis. Technically, spam can be any unsolicited or unwanted message sent to your email address. These messages may not seem overtly malicious, but hackers will often use spam to achieve a certain agenda. Spam messages might come with malicious links or attachments, that when clicked on can execute code or send you to compromised websites.<\/p>\n<p><strong>Spear Phishing<\/strong>: Spear phishing tactics are focused phishing attempts on an individual, customized to appear as legitimate as possible. An example would be a local bank representative calling or sending an email asking to confirm credit card numbers or credentials.<\/p>\n<p><strong>Spoofing<\/strong>: Spoofing is the act of tricking users into believing that they\u2019re viewing something legitimate when in reality they\u2019re only looking at a fake. For example, email spoofing is a common tactic in which hackers will pose as someone from your contacts, but will have the wrong email address. Another example would be clicking a link and having it take you to a website that looks like the one you want to view, but the domain name is wrong. The idea is that hackers can replicate legitimate email names and websites to trick users into succumbing to their attacks.<\/p>\n<p><strong>Spyware<\/strong>: Spyware is a type of malware that\u2019s specifically designed to covertly gather information from a computer, and transfer that information to a hacker. Spyware can be difficult to identify due to it being designed to remain hidden.<\/p>\n<p><strong>Trojan<\/strong>: Also known as a backdoor or \u201cTrojan horse,\u201d a trojan is designed to infiltrate your network and create a reliable way to obtain access to the system in the future. Trojans are often used in conjunction with advanced persistent threats (APT) in an attempt to gather as much information as possible, while remaining hidden from security protocol.<\/p>\n<p><strong>Virus<\/strong>: One of the most famous cyber threats, a virus is a malware program that, when executed, attempts to replicate itself and spread to other computer components. Viruses are often disruptive and dangerous, especially in the business environment. They can slow business systems, delete critical data, and much more.<\/p>\n<p><strong>Vulnerability<\/strong>: A vulnerability, in terms of computing, is a bug or a problem within the code of operating systems and other software that needs to be fixed. Vulnerabilities leave networks open to potential cyber threats and are often resolved by patches and security updates issued by software manufacturers.<\/p>\n<p><strong>Zero-Day Exploits<\/strong>: This term applies to vulnerabilities that are presently unpatched or unresolved. These issues are often found in legacy software that\u2019s incompatible with modern technology, like Windows XP.<\/p>\n<p>&nbsp;<\/p>\n<h2>Stay Safe Online with DatCom, LLC<\/h2>\n<h4>Don\u2019t be intimidated by online threats.<\/h4>\n<p>We\u2019ve only scratched the surface of what\u2019s possible for hackers and their technology. There are limitless possibilities for online attacks, so it\u2019s imperative that you arm yourself against these cyber threats. For more information about how you can protect your business assets, contact DatCom, LLC at <span style=%22color: #008000;%22>(903) 842-2220<\/span>.<\/p>\n<p>At DatCom, LLC, we&#8217;re passionate about enhancing your business strategy for greater efficiency. We developed a unique set of services called\u00a0<a href=%22https:\/\/datcomllc.com\/efficientme%22>EfficientMe!<\/a>\u00a0to help people, technology, and processes work together more efficiently.<\/p>\n<p>&#8221; content_tablet=&#8221;<\/p>\n<h1><span style=%22color: #008000;%22>IT Threat Glossary<\/span><\/h1>\n<p>&nbsp;<\/p>\n<h2>Stay Updated on Cyber Threats for 2021 and Beyond<\/h2>\n<p>&nbsp;<\/p>\n<p>The rapid digital transformation of society over the last few years has given hackers more ways<img src=%22https:\/\/staging.datcomllc.com\/wp-content\/uploads\/2023\/03\/it_threats-300x187.png%22 width=%22300%22 height=%22187%22 alt=%22%22 class=%22wp-image-457 alignright size-medium%22 \/> to engage in cyberattacks against our technology infrastructure and the ordinary people who use it every day.\u00a0 Fortunately, we are taking advantage of advanced tools and methods to protect our clients against every IT threat.<\/p>\n<p>New types of malware, ransomware, and viruses are being created every day, for the express purpose of seeing your organization fail. If your business isn\u2019t using comprehensive security solutions, you remain vulnerable to threats that can potentially compromise and damage your business\u2019s IT infrastructure.<\/p>\n<p>To help make cybersecurity easier for you, we\u2019ve compiled a list of threats that your business should be prepared to face.<\/p>\n<p><strong>Advanced Persistent Threat (APT)<\/strong>: An APT is a stealthy network breach that\u2019s designed to remain undetected for a certain amount of time. APTs are usually used to steal information from a specific individual or organization over time, rather than cause an immediate disruption to operations.<\/p>\n<p><strong>Adware<\/strong>: Adware automatically displays ads on software, particularly web browsers, in an effort to generate revenue for its creator. Adware can often come packaged with free online software, and while it\u2019s not immediately threatening, it can become a severe annoyance and potential security threat. When used as malware, adware can display unwanted (and often embarrassing) advertisements in the form of popups or web ads.<\/p>\n<p><strong>Botnet<\/strong>: A botnet is a collective term used for a network of devices built from \u201cbots,\u201d which are computers controlled remotely by a hacker. Botnets are typically used to complete repetitive tasks, like sending spam messages or participating in Distributed Denial of Service (DDoS) attacks. Due to botnets spreading their infection to other computers, they\u2019re often likened to a \u201czombie horde.\u201d<\/p>\n<p><strong>Brute-force Attacks<\/strong>: Brute-force attacks are commonly used tactics to break into online accounts, particularly those that take advantage of encryption. A brute-force attack consists of the hacker rapidly inputting as many passwords as possible in an attempt to find the right combination of characters.<\/p>\n<p><strong>Command and Control Server<\/strong>: A command and control server (C&amp;C server) is the central computer that remotely issues commands to botnets and other malware. These botnets and malware will then send information back to the C&amp;C server, like sensitive data or account credentials.<\/p>\n<p><strong>Dictionary Attack<\/strong>: Dictionary attacks utilize known words or phrases in an attempt to crack through passwords and usernames. They can be used in conjunction with brute-force attacks to guess credentials and infiltrate accounts.<\/p>\n<p><strong>Distributed Denial of Service (DDoS)<\/strong>: A DDoS attack consists of multiple systems from varied locations target a single system. The resulting traffic is usually an attempt to bring down a server, forcing it offline until the attack ceases. DDoS attacks are often performed by botnets, compromised computers that have been enslaved by hackers to do their bidding.<\/p>\n<p><strong>Exploit<\/strong>: A loose definition would be a tool designed for use in exploiting a specific vulnerability within an IT system component, usually for the purpose of stealing data or installing malicious software.<\/p>\n<p><strong>Keylogging<\/strong>: A keylogger could be either a software or a hardware that\u2019s designed to capture and record keystrokes. Software versions of keyloggers are often included in viruses or malware packages to capture credentials for later use. The victim is typically unaware that their activities are being monitored.<\/p>\n<p><strong>Malware<\/strong>: Malware, derived from \u201cmalicious software,\u201d is a term used to describe any cyber threat that is intrusive and malicious in nature. This can include any number of online threats, including computer viruses, trojans, ransomware, spyware, and others. Malware is usually activated through the use of executable code or scripts. Basically, anything that has malicious intent can be considered malware.<\/p>\n<p><strong>Phishing<\/strong>: Phishing tactics are used by hackers to lure targets into handing over sensitive credentials, like usernames, passwords, credit card numbers, Social Security numbers, and so on, usually through email spam tactics or other electronic means. Phishing tactics will often masquerade as a trusting or intimidating entity.<\/p>\n<p><strong>Ransomware<\/strong>: Ransomware is a type of malware that attempts to extort money or credentials from users by locking down local files on their PC or workstation, usually through the use of encryption technology. The user may (or may not) receive the decryption key upon giving in to the hacker\u2019s demands.<\/p>\n<p><strong>Social Engineering<\/strong>: Social engineering is a tactic used by hackers that appeals to the weaknesses of the end-user. They are particularly dangerous when people are using<span>\u00a0<\/span><a href=%22https:\/\/auth0.com\/blog\/the-9-most-common-security-threats-to-mobile-devices-in-2021\/%22>mobile devices<\/a><span>\u00a0<\/span>when they aren&#8217;t focused on work. Hackers find ways to circumvent common security protocol by posing as important officials or users within a company, or even as an internal IT department. Social engineering tactics are cause for concern primarily because they target the unpredictable nature of human activity.<\/p>\n<p><strong>Spam<\/strong>: Spam is mostly known as the time-wasting emails that users receive on a daily basis. Technically, spam can be any unsolicited or unwanted message sent to your email address. These messages may not seem overtly malicious, but hackers will often use spam to achieve a certain agenda. Spam messages might come with malicious links or attachments, that when clicked on can execute code or send you to compromised websites.<\/p>\n<p><strong>Spear Phishing<\/strong>: Spear phishing tactics are focused phishing attempts on an individual, customized to appear as legitimate as possible. An example would be a local bank representative calling or sending an email asking to confirm credit card numbers or credentials.<\/p>\n<p><strong>Spoofing<\/strong>: Spoofing is the act of tricking users into believing that they\u2019re viewing something legitimate when in reality they\u2019re only looking at a fake. For example, email spoofing is a common tactic in which hackers will pose as someone from your contacts, but will have the wrong email address. Another example would be clicking a link and having it take you to a website that looks like the one you want to view, but the domain name is wrong. The idea is that hackers can replicate legitimate email names and websites to trick users into succumbing to their attacks.<\/p>\n<p><strong>Spyware<\/strong>: Spyware is a type of malware that\u2019s specifically designed to covertly gather information from a computer, and transfer that information to a hacker. Spyware can be difficult to identify due to it being designed to remain hidden.<\/p>\n<p><strong>Trojan<\/strong>: Also known as a backdoor or \u201cTrojan horse,\u201d a trojan is designed to infiltrate your network and create a reliable way to obtain access to the system in the future. Trojans are often used in conjunction with advanced persistent threats (APT) in an attempt to gather as much information as possible, while remaining hidden from security protocol.<\/p>\n<p><strong>Virus<\/strong>: One of the most famous cyber threats, a virus is a malware program that, when executed, attempts to replicate itself and spread to other computer components. Viruses are often disruptive and dangerous, especially in the business environment. They can slow business systems, delete critical data, and much more.<\/p>\n<p><strong>Vulnerability<\/strong>: A vulnerability, in terms of computing, is a bug or a problem within the code of operating systems and other software that needs to be fixed. Vulnerabilities leave networks open to potential cyber threats and are often resolved by patches and security updates issued by software manufacturers.<\/p>\n<p><strong>Zero-Day Exploits<\/strong>: This term applies to vulnerabilities that are presently unpatched or unresolved. These issues are often found in legacy software that\u2019s incompatible with modern technology, like Windows XP.<\/p>\n<p>&nbsp;<\/p>\n<h2>Stay Safe Online with DatCom, LLC<\/h2>\n<h4>Don\u2019t be intimidated by online threats.<\/h4>\n<p>We\u2019ve only scratched the surface of what\u2019s possible for hackers and their technology. There are limitless possibilities for online attacks, so it\u2019s imperative that you arm yourself against these cyber threats. For more information about how you can protect your business assets, contact DatCom, LLC at <span style=%22color: #008000;%22>(903) 842-2220<\/span>.<\/p>\n<p>At DatCom, LLC, we&#8217;re passionate about enhancing your business strategy for greater efficiency. We developed a unique set of services called\u00a0<a href=%22https:\/\/datcomllc.com\/efficientme%22>EfficientMe!<\/a>\u00a0to help people, technology, and processes work together more efficiently.<\/p>\n<p>&#8220;]<\/p>\n<h1><span style=\"color: #008000;\">IT Threat Glossary<\/span><\/h1>\n<p>&nbsp;<\/p>\n<h2>Stay Updated on Cyber Threats for 2021 and Beyond<\/h2>\n<p>&nbsp;<\/p>\n<p>The rapid digital transformation of society over the last few years has given hackers more ways<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/staging.datcomllc.com\/wp-content\/uploads\/2023\/03\/it_threats-300x187.png\" width=\"300\" height=\"187\" alt=\"\" class=\"wp-image-457 alignright size-medium\" srcset=\"https:\/\/staging.datcomllc.com\/wp-content\/uploads\/2023\/03\/it_threats-300x187.png 300w, https:\/\/staging.datcomllc.com\/wp-content\/uploads\/2023\/03\/it_threats-400x250.png 400w, https:\/\/staging.datcomllc.com\/wp-content\/uploads\/2023\/03\/it_threats.png 430w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/> to engage in cyberattacks against our technology infrastructure and the ordinary people who use it every day.\u00a0 Fortunately, we are taking advantage of advanced tools and methods to protect our clients against every IT threat.<\/p>\n<p>New types of malware, ransomware, and viruses are being created every day, for the express purpose of seeing your organization fail. If your business isn\u2019t using comprehensive security solutions, you remain vulnerable to threats that can potentially compromise and damage your business\u2019s IT infrastructure.<\/p>\n<p>To help make cybersecurity easier for you, we\u2019ve compiled a list of threats that your business should be prepared to face.<\/p>\n<p><strong>Advanced Persistent Threat (APT)<\/strong>: An APT is a stealthy network breach that\u2019s designed to remain undetected for a certain amount of time. APTs are usually used to steal information from a specific individual or organization over time, rather than cause an immediate disruption to operations.<\/p>\n<p><strong>Adware<\/strong>: Adware automatically displays ads on software, particularly web browsers, in an effort to generate revenue for its creator. Adware can often come packaged with free online software, and while it\u2019s not immediately threatening, it can become a severe annoyance and potential security threat. When used as malware, adware can display unwanted (and often embarrassing) advertisements in the form of popups or web ads.<\/p>\n<p><strong>Botnet<\/strong>: A botnet is a collective term used for a network of devices built from \u201cbots,\u201d which are computers controlled remotely by a hacker. Botnets are typically used to complete repetitive tasks, like sending spam messages or participating in Distributed Denial of Service (DDoS) attacks. Due to botnets spreading their infection to other computers, they\u2019re often likened to a \u201czombie horde.\u201d<\/p>\n<p><strong>Brute-force Attacks<\/strong>: Brute-force attacks are commonly used tactics to break into online accounts, particularly those that take advantage of encryption. A brute-force attack consists of the hacker rapidly inputting as many passwords as possible in an attempt to find the right combination of characters.<\/p>\n<p><strong>Command and Control Server<\/strong>: A command and control server (C&amp;C server) is the central computer that remotely issues commands to botnets and other malware. These botnets and malware will then send information back to the C&amp;C server, like sensitive data or account credentials.<\/p>\n<p><strong>Dictionary Attack<\/strong>: Dictionary attacks utilize known words or phrases in an attempt to crack through passwords and usernames. They can be used in conjunction with brute-force attacks to guess credentials and infiltrate accounts.<\/p>\n<p><strong>Distributed Denial of Service (DDoS)<\/strong>: A DDoS attack consists of multiple systems from varied locations target a single system. The resulting traffic is usually an attempt to bring down a server, forcing it offline until the attack ceases. DDoS attacks are often performed by botnets, compromised computers that have been enslaved by hackers to do their bidding.<\/p>\n<p><strong>Exploit<\/strong>: A loose definition would be a tool designed for use in exploiting a specific vulnerability within an IT system component, usually for the purpose of stealing data or installing malicious software.<\/p>\n<p><strong>Keylogging<\/strong>: A keylogger could be either a software or a hardware that\u2019s designed to capture and record keystrokes. Software versions of keyloggers are often included in viruses or malware packages to capture credentials for later use. The victim is typically unaware that their activities are being monitored.<\/p>\n<p><strong>Malware<\/strong>: Malware, derived from \u201cmalicious software,\u201d is a term used to describe any cyber threat that is intrusive and malicious in nature. This can include any number of online threats, including computer viruses, trojans, ransomware, spyware, and others. Malware is usually activated through the use of executable code or scripts. Basically, anything that has malicious intent can be considered malware.<\/p>\n<p><strong>Phishing<\/strong>: Phishing tactics are used by hackers to lure targets into handing over sensitive credentials, like usernames, passwords, credit card numbers, Social Security numbers, and so on, usually through email spam tactics or other electronic means. Phishing tactics will often masquerade as a trusting or intimidating entity.<\/p>\n<p><strong>Ransomware<\/strong>: Ransomware is a type of malware that attempts to extort money or credentials from users by locking down local files on their PC or workstation, usually through the use of encryption technology. The user may (or may not) receive the decryption key upon giving in to the hacker\u2019s demands.<\/p>\n<p><strong>Social Engineering<\/strong>: Social engineering is a tactic used by hackers that appeals to the weaknesses of the end-user. They are particularly dangerous when people are using<span>\u00a0<\/span><a href=\"https:\/\/auth0.com\/blog\/the-9-most-common-security-threats-to-mobile-devices-in-2021\/\">mobile devices<\/a><span>\u00a0<\/span>when they aren&#8217;t focused on work. Hackers find ways to circumvent common security protocol by posing as important officials or users within a company, or even as an internal IT department. Social engineering tactics are cause for concern primarily because they target the unpredictable nature of human activity.<\/p>\n<p><strong>Spam<\/strong>: Spam is mostly known as the time-wasting emails that users receive on a daily basis. Technically, spam can be any unsolicited or unwanted message sent to your email address. These messages may not seem overtly malicious, but hackers will often use spam to achieve a certain agenda. Spam messages might come with malicious links or attachments, that when clicked on can execute code or send you to compromised websites.<\/p>\n<p><strong>Spear Phishing<\/strong>: Spear phishing tactics are focused phishing attempts on an individual, customized to appear as legitimate as possible. An example would be a local bank representative calling or sending an email asking to confirm credit card numbers or credentials.<\/p>\n<p><strong>Spoofing<\/strong>: Spoofing is the act of tricking users into believing that they\u2019re viewing something legitimate when in reality they\u2019re only looking at a fake. For example, email spoofing is a common tactic in which hackers will pose as someone from your contacts, but will have the wrong email address. Another example would be clicking a link and having it take you to a website that looks like the one you want to view, but the domain name is wrong. The idea is that hackers can replicate legitimate email names and websites to trick users into succumbing to their attacks.<\/p>\n<p><strong>Spyware<\/strong>: Spyware is a type of malware that\u2019s specifically designed to covertly gather information from a computer, and transfer that information to a hacker. Spyware can be difficult to identify due to it being designed to remain hidden.<\/p>\n<p><strong>Trojan<\/strong>: Also known as a backdoor or \u201cTrojan horse,\u201d a trojan is designed to infiltrate your network and create a reliable way to obtain access to the system in the future. Trojans are often used in conjunction with advanced persistent threats (APT) in an attempt to gather as much information as possible, while remaining hidden from security protocol.<\/p>\n<p><strong>Virus<\/strong>: One of the most famous cyber threats, a virus is a malware program that, when executed, attempts to replicate itself and spread to other computer components. Viruses are often disruptive and dangerous, especially in the business environment. They can slow business systems, delete critical data, and much more.<\/p>\n<p><strong>Vulnerability<\/strong>: A vulnerability, in terms of computing, is a bug or a problem within the code of operating systems and other software that needs to be fixed. Vulnerabilities leave networks open to potential cyber threats and are often resolved by patches and security updates issued by software manufacturers.<\/p>\n<p><strong>Zero-Day Exploits<\/strong>: This term applies to vulnerabilities that are presently unpatched or unresolved. These issues are often found in legacy software that\u2019s incompatible with modern technology, like Windows XP.<\/p>\n<p>&nbsp;<\/p>\n<h2>Stay Safe Online with DatCom, LLC<\/h2>\n<h4>Don\u2019t be intimidated by online threats.<\/h4>\n<p>We\u2019ve only scratched the surface of what\u2019s possible for hackers and their technology. There are limitless possibilities for online attacks, so it\u2019s imperative that you arm yourself against these cyber threats. For more information about how you can protect your business assets, contact DatCom, LLC at <span style=\"color: #008000;\">(903) 842-2220<\/span>.<\/p>\n<p>At DatCom, LLC, we&#8217;re passionate about enhancing your business strategy for greater efficiency. We developed a unique set of services called\u00a0<a href=\"https:\/\/datcomllc.com\/efficientme\">EfficientMe!<\/a>\u00a0to help people, technology, and processes work together more efficiently.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_cta title=&#8221;FREE IT Whitepaper&#8221; button_url=&#8221;https:\/\/datcomllc.com\/10-benefits&#8221; button_text=&#8221;Download!&#8221; admin_label=&#8221;CTA &#8211; Free IT Whitepaper&#8221; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#349966&#8243; background_color=&#8221;#efefef&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#78BD1E&#8221; button_border_color=&#8221;#78BD1E&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000;\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/staging.datcomllc.com\/wp-content\/uploads\/2023\/03\/whitepaper-CTA-article-300x200.png\" width=\"300\" height=\"200\" alt=\"\" class=\"wp-image-163 alignnone size-medium\" srcset=\"https:\/\/staging.datcomllc.com\/wp-content\/uploads\/2023\/03\/whitepaper-CTA-article-300x200.png 300w, https:\/\/staging.datcomllc.com\/wp-content\/uploads\/2023\/03\/whitepaper-CTA-article.png 330w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000;\">This whitepaper evaluates the differences between traditional technical support practices and <strong>modern managed IT practices<\/strong>\u00a0and the\u00a0<strong>pros<\/strong>\u00a0and\u00a0<strong>cons<\/strong> of both for small and medium businesses.<\/span><\/p>\n<p>[\/et_pb_cta][et_pb_contact_form title=&#8221;IT Questions?&#8221; submit_button_text=&#8221;Contact Us&#8221; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; _unique_id=&#8221;53861f92-5d64-448a-9097-b36368b9b45a&#8221; form_field_background_color=&#8221;#FFFFFF&#8221; form_field_text_color=&#8221;#000000&#8243; form_field_focus_background_color=&#8221;#FFFFFF&#8221; form_field_custom_margin=&#8221;15px|1px|15px|0px|false|false&#8221; form_field_custom_padding=&#8221;|0px||5px|false|false&#8221; form_field_text_align=&#8221;left&#8221; form_field_line_height=&#8221;1.5em&#8221; background_color=&#8221;#efefef&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#78BD1E&#8221; button_border_color=&#8221;#78BD1E&#8221; button_use_icon=&#8221;off&#8221; button_custom_margin=&#8221;|0px||8px|false|false&#8221; button_custom_padding=&#8221;|20px||20px|false|false&#8221; width=&#8221;100%&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;|0px|||false|false&#8221; custom_padding=&#8221;20px|30px|20px|30px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_contact_field field_id=&#8221;First_Name&#8221; field_title=&#8221;First Name&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.20.2&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Last_Name&#8221; field_title=&#8221;Last Name&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.20.2&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Email&#8221; field_title=&#8221;Email&#8221; field_type=&#8221;email&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Phone&#8221; field_title=&#8221;Phone&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Message&#8221; field_title=&#8221;Message&#8221; field_type=&#8221;text&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT Threat Glossary &nbsp; Stay Updated on Cyber Threats for 2021 and Beyond &nbsp; The rapid digital transformation of society over the last few years has given hackers more ways to engage in cyberattacks against our technology infrastructure and the ordinary people who use it every day.\u00a0 Fortunately, we are taking advantage of advanced tools [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":467,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":""},"_links":{"self":[{"href":"https:\/\/staging.datcomllc.com\/index.php\/wp-json\/wp\/v2\/pages\/532"}],"collection":[{"href":"https:\/\/staging.datcomllc.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/staging.datcomllc.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/staging.datcomllc.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/staging.datcomllc.com\/index.php\/wp-json\/wp\/v2\/comments?post=532"}],"version-history":[{"count":4,"href":"https:\/\/staging.datcomllc.com\/index.php\/wp-json\/wp\/v2\/pages\/532\/revisions"}],"predecessor-version":[{"id":585,"href":"https:\/\/staging.datcomllc.com\/index.php\/wp-json\/wp\/v2\/pages\/532\/revisions\/585"}],"up":[{"embeddable":true,"href":"https:\/\/staging.datcomllc.com\/index.php\/wp-json\/wp\/v2\/pages\/467"}],"wp:attachment":[{"href":"https:\/\/staging.datcomllc.com\/index.php\/wp-json\/wp\/v2\/media?parent=532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}