Not sure what a term means? You’re in the right place.
This page breaks down the words and phrases we use across Cyber Shoulder in plain English, without the techy fluff. Click on a letter to explore and get confident with the language of staying safe online.
Account Takeover
When someone gains unauthorised access to your online account — like email, banking, or shopping — and takes control of it. This can let them change your settings, send messages as you, or steal personal information. Often caused by weak, reused, or leaked passwords.
Antivirus
Software that helps protect your device by detecting and blocking harmful programs (like viruses or malware). It scans files and warns you if something suspicious is found. Many devices come with antivirus built-in — just make sure it’s turned on and up to date.
Awareness Training
Learning how to spot and avoid common cyber threats like scams, phishing, and unsafe links. Good awareness helps you act safely online — and helps protect your friends, family, or team too.
Backup
A copy of your important files or data stored somewhere safe — like an external hard drive or cloud service. If your device is lost, broken, or hit by malware, having a backup means you don’t lose everything.
BEC (Business Email Compromise)
A type of scam where attackers pretend to be someone trusted — like a boss, supplier, or accountant — and ask staff to transfer money or share sensitive info. It often looks like a real email, but something’s off.
Breach
When someone breaks into a system or account and accesses private information without permission. This could mean leaked passwords, exposed emails, or stolen files. Breaches often happen through weak security or phishing.
Browser Redirect
When you click a link and it unexpectedly sends you to a different website — often one that’s unsafe or fake. If a site suddenly changes or looks strange, close it and don’t enter any details.
Cloud Services
Online tools that store or manage your data — like Google Drive, Microsoft 365, or Dropbox. They’re useful for backing up files and working from anywhere, but you should always secure them with strong passwords and 2-step login.
Community
At Cyber Shoulder, “community” means people helping people — whether that’s through advice, sharing experiences, or just showing up. We create a safe space where anyone can ask questions without fear of judgment.
Cyber Concern
Any worry or question you have about something suspicious online — from scam messages and strange device behaviour to unsure links or potential risks. If it feels off, it counts.
Cyber Incident
An unexpected or suspicious online event that could harm your devices, accounts, or data. Examples include phishing emails, scam calls, fake invoices, malware, or a hacked account.
Cyber Risk
The chance that something you do online — or something done to you — could cause harm. That might involve your identity, finances, work, or personal safety. Cyber risk isn’t just for big companies — it affects everyone.
Cyber Safety
The habits, tools, and choices that help you stay secure online. That includes using strong passwords, thinking before you click, and knowing how to spot scams or suspicious behaviour.
Cyber Threat
Anything that could cause harm to your online life — from phishing emails and fake websites to data theft or impersonation. Threats don’t always look dangerous at first — that’s why knowing the signs matters.
Cybersecurity
The practice of protecting yourself, your devices, and your data from online threats. It’s not just for tech experts — anyone can take steps to be more secure with the right support and guidance.
Data Breach
When private information — like emails, passwords, or personal details — is accessed or leaked without permission. Breaches often come from hacked websites or poor security practices. You can check if your data has been exposed using tools like Have I Been Pwned.
Data Leak
When sensitive information accidentally becomes visible or accessible to others — not always due to hacking. For example, a file shared publicly by mistake or a misconfigured setting could cause a leak.
Default Password
The original password that comes with a device or account (like “admin” or “1234”). These are often well-known and should be changed immediately to something strong and unique.
Device Behaviour
How your phone, tablet, or computer acts. If it’s suddenly slow, glitchy, crashing, or behaving oddly — it could be a sign of malware or unwanted software. If it feels off, it’s worth checking.
Email Scam
A message that looks legitimate but is trying to trick you — often by pretending to be a company, bank, or person you trust. These scams might ask for money, logins, or personal info. Always check the sender and don’t click links unless you’re sure.
End-to-End Encryption
A way of securing messages so only the sender and receiver can read them — not hackers, not apps, not even the service provider. It’s used by apps like WhatsApp to keep your conversations private.
Fake Invoice
A scam that looks like a real bill or payment request — often sent to small businesses or freelancers. It might use a familiar name or logo but ask you to pay into the wrong account.
Fake Website
A site made to look like a real one — often used in phishing attacks. It might copy a bank, shop, or service to trick you into entering your login details or card information. Check the web address carefully.
Financial Risk
The danger of losing money due to scams, stolen details, or unauthorised payments. This could come from a hacked account, phishing attack, or even giving away info by accident.
Fraud
When someone lies or pretends to be someone else to steal money or information. Online fraud can take many forms — fake messages, impersonation, shopping scams, or suspicious links are all common tactics.
Guidance
Advice, support, or recommendations to help you stay safer online. At Cyber Shoulder, our guidance is practical, jargon-free, and based on real-world experience — no judgment, just help.
Hacking
When someone gains unauthorised access to systems, accounts, or devices — usually to steal data, spy, or cause disruption. It can happen through weak passwords, phishing, or software vulnerabilities.
HaveIBeenPwned
A free tool that lets you check if your email or password has been exposed in a data breach. If your info shows up, it means you should change your password — especially if you’ve reused it elsewhere.
Hot Take
An opinion or reaction shared quickly, often with a bit of edge or passion. On Cyber Shoulder, our Hot Takes are bold thoughts or challenges to common cybersecurity norms — designed to start conversations, not lectures.
Identity Theft
When someone uses your personal information — like your name, address, or bank details — to impersonate you, open accounts, or commit fraud. It often starts with a data breach, phishing scam, or leaked info.
Impersonation
When a scammer pretends to be someone you know or trust — like a colleague, family member, or company — to trick you into sharing info or sending money. This can happen via email, text, or even phone calls.
Information Sharing
Any time you give out details about yourself — names, login info, addresses, or business data. Some sharing is normal, but oversharing (especially online or in public forums) can open you up to risk.
Link (Suspicious)
A web address that doesn’t look quite right — it might be slightly misspelled, overly long, or hidden behind text like “Click here.” Suspicious links are often used in scams to lead you to fake sites or trigger downloads.
Lock Your Device
Setting a password, PIN, fingerprint, or face ID on your phone, tablet, or computer. It helps protect your data if your device is lost or stolen — and stops others from snooping.
Login Alert
A notification from an app or service that your account was accessed or someone tried to log in. If it wasn’t you, change your password immediately and turn on 2-step login if it’s not already.
Malware
Short for “malicious software” — programs designed to harm your device, steal data, or spy on you. It can arrive through dodgy downloads, fake links, or infected USB sticks.
Manipulation
When someone uses emotional pressure — like fear, urgency, or trust — to trick you into doing something you normally wouldn’t. Scammers rely on this to make their attacks work.
MFA (2-Step Login)
Multi-Factor Authentication adds an extra layer of security by requiring something you know (like a password) plus something you have (like a code from your phone). It makes it much harder for attackers to break into your accounts.
Missing Data
When information has been deleted, wiped, or hidden — whether accidentally or as part of an attack. If files suddenly disappear or can’t be opened, it may be a sign of a bigger problem.
MSSP (Managed Security Service Provider)
A company that helps other businesses protect their systems, detect threats, and respond to cyber incidents. Think of it as outsourced cybersecurity support.
Password Manager
A secure app that stores and remembers your passwords, so you don’t have to. It can generate strong, unique passwords and fill them in for you when you log in. Safer than reusing the same password everywhere.
Password (Strong / Weak / Reused)
Personal Information
Anything that identifies you — like your name, address, date of birth, ID number, or even photos. Scammers collect this to commit fraud or impersonate you.
Phishing
When someone sends a fake message (usually email or text) pretending to be a trusted source, hoping you’ll click a link, open an attachment, or hand over information. It’s one of the most common types of cyber attack.
Pop-Up Warning
A message that appears on your screen — sometimes real, sometimes fake. Scam pop-ups may claim your device is infected and urge you to click or call a number. Never follow instructions from an unexpected pop-up.
Prevention
Taking steps to stay safe before anything goes wrong — like using strong passwords, keeping devices updated, and being cautious with messages and links. Prevention is simpler (and cheaper) than fixing a problem later.
Ransomware
A type of malware that locks your files or system and demands payment (a ransom) to unlock them. It can hit individuals or businesses — backups and up-to-date protection are your best defence.
RATs (Remote Access Trojans)
Malicious programs that give attackers remote control over your device — letting them spy, steal data, or install more malware. They often hide in fake downloads or suspicious email attachments.
Romance Scam
A scam where someone pretends to form a relationship with you online — then asks for money, gifts, or personal details. They often play on trust and emotion. These scams are common, serious, and devastating — you’re never alone if this happens to you.
Risk Reduction
The steps you take to lower your chances of being affected by a cyber threat. That might mean training, better passwords, locking down accounts, or just learning what to look out for.
Scam Call
A phone call from someone pretending to be a company, bank, or authority — often using urgency or fear to pressure you into giving details or making a payment. If it feels off, hang up and call back using a number you trust.
Scam Email
A message designed to trick you into clicking a link, downloading a file, or handing over personal info. It may look like it’s from a real company, but there are often subtle signs — weird email addresses, grammar mistakes, or pressure to act fast.
Scam Text
A short message pretending to be from a delivery company, bank, or other service — often with a suspicious link. These can install malware or steal your information. Don’t click unless you’re sure it’s legit.
Security Tools
Software or settings that help protect your devices and data — like antivirus, firewalls, password managers, or device encryption. You don’t need every tool, just the right ones for your needs.
Social Engineering
When someone manipulates you into doing something — like clicking a link or sharing info — by building trust, creating panic, or pretending to be helpful. The goal is always to bypass your normal caution.
Support
At Cyber Shoulder, support means listening, helping without judgement, and guiding people through digital risks — whether that’s individuals, small businesses, or anyone in-between.
Unexpected Activity
Anything strange on your account or device — like logins you don’t recognise, messages you didn’t send, or settings that have changed. Often a sign something’s wrong and worth looking into.
Update (Device or Software)
When your phone, app, or computer installs the latest version — usually to fix bugs or patch security holes. Keeping things updated is one of the simplest ways to protect yourself.
Urgency (Scam Technique)
Scammers love to rush you. They’ll say things like “act now,” “your account will be locked,” or “someone’s hacked you” to make you panic and skip checking. If you feel pressured, that’s your cue to pause.
Unusual Account Activity
Alerts or signs that something’s not right — logins from new locations, password resets you didn’t request, or unfamiliar devices. Check your security settings and change your password if anything looks off.
Warning Signs
Clues that something might not be right — like spelling errors, odd links, strange sender addresses, or messages that feel too urgent or emotional. Spotting the signs early can stop an attack before it starts.
WhatsApp Contact
You can message Cyber Shoulder directly through WhatsApp for support or advice. Your messages are end-to-end encrypted, and we treat everything you share with full confidentiality — no judgment, no pressure.
Weak Password
A password that’s easy to guess or crack — like “123456,” your pet’s name, or reused across sites. Weak passwords make you an easy target. Use strong, unique ones instead (a password manager can help).