• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure

What is Cyber Security?

Infographic from GTreasury attempts to shed some light on the terms and issues around cyber security.

January 3, 2017 TechDecisions Staff Leave a Comment

What is cyber security?

That’s the question that GTreasury, a company that offers a Treasury Management System (TMS), attempts to answer in a recent infographic.

First, a primer on what some of the terms surrounding cyber security mean:

  • Spam is electronic junk mail. The term refers to unsolicited, and often times unwanted, email.
  • Spear Phishing is a type of highly specialized attacks against specific targets to collect information and or gain access to systems. A common example of spear phishing is when a cybercriminal initiates an attack on a business to gain access to the network. From there, the criminal is able to send emails that look authentic and can easily make it through spam filters.
  • Social Engineering attacks involve manipulation of users and employees to offer confidential and sensitive data. These types of attacks usually involve email to invoke fear and urgency, forcing the unsuspecting victim to share information by opening a malicious file or click a harmful link. It is a type of confidence trick for the purpose of information gathering, fraud, or system access. It differs from a traditional “con” in that it is often one of many steps in a more complex fraud scheme.
  • Confederates Inside the Target Institutions refers to a group of cybercriminals of which one or more are secretly working from within the targeted institution. These ‘inside men’ can use social engineering, theft, or other nefarious means to aid their colleagues outside the institution.
  • Black-Hat Tool Kits are a set of tools whose initial purpose was to provide researchers with the means to test the security of networks and devices. However, they are often used by hackers, “black hats”, to break into networks.
  • Single sign-on (SSO) is a method of access control for multiple related, but independent software systems. With SSO a user logs in with a single ID and password to gain access to a connected system or systems without using different usernames or passwords, or in some configurations seamlessly sign on at each system. Conversely, single sign-off is the property whereby a single action of signing out terminates access to multiple software systems.
  • IP White Listing is a term for a list of email addresses or IP addresses that are deemed spam free. The list overrides blacklists and spam filters, allowing emails to be delivered to a users inbox rather than filtered out as spam.
  • Multi-Factor Authentication is a type of access control where a user is only granted access after providing several separate pieces of information for authentication. Typically at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are).
  • A firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted, secure internal network and another outside network, such as the Internet, that is assumed not to be secure or trusted.

 

Cyber Security

Cyber Security was created by GTreasury, a leading provider of treasury management systems.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Corporate, Cyber Security

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Software License Spending, SaaS, cloud apps Your Guide to Choosing the Best Cloud Security…
  • IT Budget 2025 Budgeting Tips for IT Pros/CIOs in 2025
  • A close-up of a technician’s hands typing and navigating through troubleshooting steps on a computer in a well-lit office. , natural light, soft shadows, with copy space Five Ways to Reduce Desktop Support Troubleshooting Time

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.