Skip to main content
Knowledge Base

Cybersecurity Glossary for Business Leaders

A plain-language reference guide to cybersecurity terms, technologies, and compliance frameworks — written for business owners and decision-makers, not technicians.

Security Services

Managed Security Services Provider(MSSP)

An MSSP is a third-party company that provides outsourced security monitoring and management for businesses. MSSPs operate a Security Operations Center (SOC) and deliver services like threat detection, incident response, compliance management, and email security — replacing the need for an in-house security team.

Why it matters for your business: Most SMBs cannot afford a $350K+ internal security team. An MSSP provides enterprise-grade protection at a fraction of the cost.

Managed Detection and Response(MDR)

MDR is a cybersecurity service focused specifically on detecting threats across your environment and responding to incidents. Unlike an MSSP, MDR typically does not include compliance management, email security, or broad IT security — it specializes in threat hunting and incident response.

Why it matters for your business: MDR is the detection engine. An MSSP includes MDR capabilities plus everything else your business needs to maintain a complete security posture.

Security Operations Center(SOC)

A SOC is a centralized team that monitors, detects, analyzes, and responds to cybersecurity threats 24/7. A SOC combines people, processes, and technology to continuously protect an organization's digital assets.

Why it matters for your business: Threats do not keep business hours. A 24/7 SOC means someone is actively watching your environment at 2 AM on a Sunday when attackers prefer to strike.

Virtual Chief Information Security Officer(vCISO)

A vCISO is a part-time or outsourced security executive who provides strategic security leadership without the cost of a full-time hire. A vCISO develops security strategy, manages risk, and ensures compliance at the executive level.

Why it matters for your business: A full-time CISO costs $200K+ annually. A vCISO provides the same strategic guidance and board-level reporting at a fraction of the cost.

Technologies

Endpoint Detection and Response(EDR)

EDR is security software installed on every device (endpoint) in your network that continuously monitors for suspicious activity, automatically blocks known threats, and provides forensic data for investigation. EDR replaces traditional antivirus with AI-powered detection that catches zero-day attacks and fileless malware.

Why it matters for your business: Traditional antivirus catches less than 50% of modern threats. EDR catches what antivirus misses — including advanced persistent threats that sit quietly in your environment for months.

Extended Detection and Response(XDR)

XDR extends EDR by correlating threat data across endpoints, email, cloud, and network — providing a unified view of an attack across your entire environment rather than isolated alerts from individual tools.

Why it matters for your business: Attackers do not stay on one device. XDR connects the dots across your entire environment so analysts can see the full attack chain, not just individual events.

Security Information and Event Management(SIEM)

A SIEM collects and analyzes log data from across your IT environment — servers, firewalls, applications, cloud services — to detect security threats through correlation and pattern recognition.

Why it matters for your business: A SIEM turns millions of log entries into actionable alerts. Without it, threats hide in the noise of normal business activity.

Multi-Factor Authentication(MFA)

MFA requires users to verify their identity using two or more factors — something they know (password), something they have (phone), or something they are (fingerprint) — before granting access to systems or data.

Why it matters for your business: 80% of breaches involve compromised credentials. MFA stops most credential-based attacks even when the password has already been stolen.

Zero Trust

Zero Trust is a security framework based on the principle of "never trust, always verify" — requiring authentication and authorization for every user, device, and connection, regardless of whether they are inside or outside the network perimeter.

Why it matters for your business: The traditional castle-and-moat approach fails when employees work remotely and data lives in the cloud. Zero Trust eliminates the concept of a trusted internal network.

Compliance Frameworks

Health Insurance Portability and Accountability Act(HIPAA)

HIPAA requires healthcare organizations and their business associates to implement specific security controls to protect patient health information (PHI). Violations can result in fines up to $1.9 million per incident depending on the level of negligence.

Why it matters for your business: If you handle patient data — even as a business associate of a healthcare provider — HIPAA compliance is not optional and the penalties are steep.

Service Organization Control 2(SOC 2)

SOC 2 is a security framework that demonstrates your organization meets specific trust service criteria for security, availability, processing integrity, confidentiality, and privacy. SOC 2 Type II certification requires ongoing compliance demonstrated over a defined review period.

Why it matters for your business: Enterprise clients and partners increasingly require SOC 2 certification before doing business with you. Without it, you may be disqualified from high-value contracts.

Cybersecurity Maturity Model Certification(CMMC)

CMMC is a Department of Defense framework that requires defense contractors to meet specific cybersecurity standards to handle Controlled Unclassified Information (CUI). CMMC 2.0 has three levels, with Level 2 requiring 110 controls based on NIST SP 800-171.

Why it matters for your business: No CMMC certification means no DoD contracts. The requirement is actively enforced and flows down to subcontractors throughout the defense supply chain.

Payment Card Industry Data Security Standard(PCI DSS)

PCI DSS requires any organization that processes, stores, or transmits credit card information to maintain specific security controls. PCI DSS 4.0 took effect in March 2025 with stricter authentication and monitoring requirements.

Why it matters for your business: Non-compliance can result in fines of $5,000–$100,000 per month and loss of your ability to process credit card payments entirely.

NIST Cybersecurity Framework(NIST CSF)

The NIST Cybersecurity Framework is a voluntary set of guidelines that helps organizations manage and reduce cybersecurity risk. Organized around five functions — Identify, Protect, Detect, Respond, Recover — it provides a common language for cybersecurity across any industry.

Why it matters for your business: NIST CSF is the baseline that most other compliance frameworks build upon. Understanding it gives you a map for improving security posture even if formal certification is not required.

Threat Types

Phishing

Phishing is a social engineering attack where attackers send fraudulent emails, texts, or messages designed to trick recipients into revealing credentials, clicking malicious links, or transferring funds. AI-generated phishing emails are now grammatically perfect and highly personalized using data scraped from social media.

Why it matters for your business: 91% of cyberattacks begin with a phishing email. It remains the number one attack vector against businesses of all sizes — and it is getting harder to detect.

Ransomware

Ransomware is malware that encrypts your files and demands payment — usually in cryptocurrency — for the decryption key. Modern ransomware attacks also steal data before encrypting it, threatening to publish sensitive information if the ransom is not paid (double extortion).

Why it matters for your business: The average ransomware payment exceeded $1.5 million in 2025. Average downtime is 21 days. Many businesses that experience a ransomware attack never fully recover.

Business Email Compromise(BEC)

BEC is a targeted attack where criminals impersonate executives, vendors, or partners via email to trick employees into transferring funds or sharing sensitive information. BEC attacks often involve no malware — just social engineering and carefully researched impersonation.

Why it matters for your business: BEC caused $2.9 billion in losses in 2023 according to the FBI. It is the most financially damaging cybercrime category, and the funds are almost never recovered.

Ready to Secure Your Business?

Get a free security assessment and discover how Vigil Cyber can protect your organization for a fraction of the cost of building an internal team.

24/7

SOC Coverage

<1hr

Response Time

99.9%

Uptime SLA