Software that encrypts, stores and manages an individual's passwords.
A simulated cyberattack designed to find vulnerabilities within networks or a home security system.
A social engineering attack where cybercriminals pose as legitimate institutions, often by sending fake text messages, emails or phone calls, to entice users to turn over sensitive personal information.
Personally-Identifiable Information Data that can be used either alone, or with other pieces of information, to identify a given individual. Examples include names, phone numbers, Social Security numbers and home addresses.
A document outlining how an organization handles and uses any data it collects.