Skip to content
David X Martin
Cyber Risk Management for business leaders
  • Home
  • Why Cybersecurity Matters
  • CyberWellness
  • Books
  • Articles & Media
  • Glossary
  • How I Help
  • About

Tag: data breach

Cybersecurity Glossary: Vulnerabilities

November 30, 2019 David X Martin

Vulnerabilities are the gates through which threats enter the enterprise. The more applications a company deploys, the more vulnerabilities it creates for itself.

Continue Reading →

Posted in: Glossary Filed under: data breach, hack

Cybersecurity Glossary: Hacker

November 21, 2019 David X Martin

A hacker is an unauthorized user who breaks into computer systems to steal, change or destroy information, often by installing dangerous malware without the knowledge or consent of the device’s rightful owner or user.

Continue Reading →

Posted in: Glossary Filed under: cyberattack, data breach, hack

Cybersecurity Glossary: Forensics

David X Martin

The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.

Continue Reading →

Posted in: Glossary Filed under: cyberattack, data breach, hack

Cybersecurity Glossary: Data Security

David X Martin

The core elements of data security are: confidentiality, which ensures that data is accessed only by authorized individuals; integrity ensures that information is reliable, as well as accurate; and availability, which ensures that data is both available and accessible to satisfy business needs.

Continue Reading →

Posted in: Glossary Filed under: data breach, types of cybersecurity

Cybersecurity Glossary: Cyber Crime

November 12, 2019 David X Martin

Cyber crime occurs when a computer is the object of the crime or is used as a tool to commit an offense.

Continue Reading →

Posted in: Glossary Filed under: cyberattack, data breach, hack, types of breaches

Cybersecurity Glossary: Ransomware

October 29, 2019 David X Martin

Ransomware is essentially digital extortion executed through software that uses encryption techniques to keep files — and entire systems — locked from use by their original owner, and holds them hostage.

Continue Reading →

Posted in: Glossary Filed under: cyberattack, data breach, hack

Cybersecurity Glossary: Breach

David X Martin

A breach comes as a result of a cyberattack that allows cybercriminals to gain unauthorized access to a computer system and steal confidential data. Exploits, phishing and other methods are used.

Continue Reading →

Posted in: Glossary Filed under: data breach, types of breaches

Can I help?

Interested to learn more about How I Help?

- Advisor & Board Director
- Expert Witness
- Speaker & Author

Follow me on Twitter

My Tweets

Latest posts

  • Ransomware: Don’t Expect Governments Alone to Save Us
  • CyRM: Mastering the Management of Cybersecurity Risk, with David X Martin
  • The Future of Risk Management

Get in touch


Contact form

Let’s Connect

  • X
  • LinkedIn

NEW! CyRM: Mastering the Management of Cybersecurity

CyRM Mastering the management of cybersecurity by David X Martin

Introducing CyRM as an approach to growth

CyRM cyberWELlness

Search DavidXMartin.com

#cyberwellness
#cyrmbook
#cybersecurity
#riskmanagement
#cyberriskmanagement

LEARN THE LINGO
Cybersecurity Glossary

Privacy Policy

Your data is protected.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
Copyright © David X Martin
Website by MediaMoxie.com