The ABCs of Cybersecurity: Part 5

Cybersecurity is like learning a new language, every concept adds to your fluency in staying safe online. In this edition of our ABCs of Cybersecurity series, we’ll turn our attention to the letters Q, R, S, and T, uncovering a fresh set of terms that are vital in the digital safety conversation.  

Q – Quarantine:

In cybersecurity, quarantine refers to isolating suspicious files or programs detected by antivirus or endpoint protection software. When a potential threat is found like a virus or malware, the system moves it to a secure location. This allows users or administrators to investigate further and decide whether to delete, repair, or restore the file. Think of it as putting a sick file in digital isolation, stopping the spread before it causes system-wide damage.  

R – Ransomware:

It is a type of malicious software that locks users out of their systems or encrypts their data, demanding a ransom for restoration. It’s one of the most dangerous and costly forms of cyberattacks today, affecting hospitals, businesses, and individuals alike. Prevention strategies include regular data backups, employee training, updated security software, and not clicking suspicious links.  

S – Social Engineering:

This is the art of manipulating people into revealing confidential information or performing actions that compromise security. Common examples include phishing emails, fake tech support calls, and urgent requests from “bosses.” Rather than targeting technology, social engineering exploits human psychology curiosity, fear, or urgency. Building awareness, verifying requests through trusted channels, and pausing before sharing sensitive information are key defences against these tactics.  

T – Two-Factor Authentication (2FA):

Adds a second layer of security beyond just a password. After entering your login credentials, you must confirm your identity through a second method such as a code sent to your phone/email or a fingerprint scan. Even if a hacker steals your password, 2FA can block unauthorised access. It’s one of the easiest and most effective ways to protect accounts.   These cybersecurity terms provide insight into both offensive threats and defensive practices. As cyber risks grow more sophisticated, so must our awareness and tools. By understanding and applying concepts, everyday users can build stronger digital habits and reduce vulnerabilities. Stay tuned for the next chapter of our cybersecurity alphabets to continue strengthening your cyber vocabulary one letter at a time.
 
0
Would love your thoughts, please comment.x
()
x