Cyber

Cookies you can’t eat, clouds you can’t see, and other cyber security terms you need to know

circuit

Keeping your business running smoothly can be a challenge, especially if you operate online (and who doesn’t these days?). But understanding key cyber security terms is an important first step toward keeping your business cyber-safe. Here’s a handy list.

 

Botnet – Short for “robot network,” a botnet is a group of computers that are coordinated to perform a task. In the hands of cyber criminals, botnets can be used to transmit malware or spam, or to steal data.

 

Cloud – The cloud is a global network of servers that are connected and operate as a single ecosystem. This technology allows you to store, access, and deliver files and services through the Internet from anywhere in the world. To keep your information safe in the cloud, make sure your employees update their passwords regularly, opt for two-step verifications, and encrypt your files.

 

Cookie – A computer cookie is a small data file that a website puts on your computer when you are browsing. Cookies can keep track of your visits and activity, and are often used to enable websites to recognize whether you are logged in, have items in your shopping cart, or provide a customized experience.

DDoS attack – DDoS stands for Distributed Denial of Service, a form of cyberattack in which a website is flooded with malicious traffic or data from multiple sources in an attempt to make the site unusable.

 

Firewall – This defensive technology can be software or hardware-based and is designed to block hackers and other bad actors from getting into your network or computer.

 

IP Address – This is the address of your computer. When you operate over a network or connect the Internet, your IP address is your computer’s unique identifier.

 

Malware – Short for “malicious software,” malware is a program specifically designed to damage or gain unauthorized access to your computer. It can take many forms—these are two of the most common:

 

  • Ransomware – A form of malware that prevents you from accessing files on your computer, basically holding your data hostage by encrypting your files so that cyber criminals can demand that you pay a ransom for the decryption key.
  • Trojan horse – Allows hackers to gain remote access to your computers by masquerading as a benign application—for example, a fake advertisement or email attachment. Clicking on a Trojan horse may allow attackers to access your personal information or download a virus onto your computer.

 

To keep malware from affecting your business, put a multi-level network protection strategy in place, ensure your operating systems and virus software are updated, use firewalls, and avoid clicking on suspicious links or attachments.

 

Open Wi-Fi – Open Wi-Fi networks are unencrypted, meaning they’re not protected and anyone can access them. This may allow potential hackers to see the sites you visit, your login passwords, and your personal data. The best way to avoid hackers is to only log on to encrypted Wi-Fi, which requires a password.

 

Phishing – These scams pose as emails from an organization or person that you know, and typically include a malicious link or attachment, that, if clicked on, will download malware onto your computer or system. The easiest way to avoid these scams is to never click on a suspicious link or attachment.

 

VPN (Virtual Private Network) – A VPN is an encrypted Internet connection often used by businesses. It allows you to connect safely into a network to conduct work remotely and transmit sensitive data.

Insights and expertise

We keep you informed — and your business protected — with these helpful articles.
credit card and keyboard
Cyber
How to improve cyber security for your small business
Just because you run a small business, doesn’t mean you’re beyond a hacker’s notice.
data management
Cyber
Making data management a business priority
As more and more companies turn to big data and the cloud, business data management is going to become a key pillar of success.
retail payment
Cyber
Protect your retail business from cyber crime
In today’s retail landscape, technologies create business efficiencies and the ability to easily transact sales around the globe—but they can also make retail stores vulnerable to cyber risks.
dominoes
Cyber
Don’t play cyber risk "dominos" with your business
Cybersecurity risks are critically challenging for businesses, with the potential to cause severe business disruption and financial impact.
woman working
Cyber
How to protect your business from cyber threats when employees work from home
Operating your business with a remote workforce creates added cyber risks. Taking key steps will strengthen your cyber security.

Seeking a business insurance quote?

We can help with that.

This document is advisory in nature and is offered as a resource to be used together with your professional insurance advisors in maintaining a loss prevention program. It is an overview only, and is not intended as a substitute for consultation with your insurance broker, or for legal, engineering or other professional advice.

Chubb is the marketing name used to refer to subsidiaries of Chubb Limited providing insurance and related services. For a list of these subsidiaries, please visit our website at www.chubb.com. Insurance provided by ACE American Insurance Company and its U.S. based Chubb underwriting company affiliates. All products may not be available in all states. This communication contains product summaries only. Coverage is subject to the language of the policies as actually issued. Surplus lines insurance sold only through licensed surplus lines producers. Chubb, 202 Hall's Mill Road, Whitehouse Station, NJ 08889-1600.