Skip to content
bs-intro-img-bg
Glossary

Glossary of Cybersecurity Terms

Keeping up with the constant influx of new cybersecurity terminology can be difficult. However, Bolster is here to help. Our glossary provides clear definitions for the latest important terms used in the cybersecurity and information security industry that you should be familiar with.

home-intro-thumb

Search by A-Z

How can we help?

Website Spoofing (With Examples)

What is Website Spoofing? Website spoofing creates a fake website that poses as a legitimate website, typically of a well-known company or organization. A spoofed website copies the victim’s content…

Phishing Tracking

Phishing attacks continue to be a major threat to businesses, with cybercriminals becoming increasingly sophisticated in their methods. Phishing tracking is an essential tool for IT security and risk management…

Phishing Template

Phishing templates are pre-made email or website templates used to mimic legitimate communications and trick victims, often included in phishing kits. What is a phishing template? Phishing templates are pre-made…

Phishing Protection

Software designed to prevent impersonators and other malicious actors from using social engineering to gain access to systems.

Trap Phishing

Phishing attempts designed to trick users with malware attachments or malicious links.

Global Fraud Index

A digital tool that provides reporting and data related to fraud worldwide.

Spear Phishing

What is Spear Phishing? Spear phishing, also known as trap phishing or whaling, is a targeted form of phishing attack that is designed to trick high-level individuals within a company…

Fraud Prevention

Well-established behaviors designed to eliminate deceptive practices.

Image of Mid Year Report Cover
Report

2026 Fraud Trends & Prediction Report

buyers-guide
Buyer’s Guide

Buyer’s Guide: Purchasing a Brand Security Solution

Image of Webinar
Webinar

Fraud Without Red Flags Webinar

Image of Takedown
One-Pager

Impersonation Takedown Website Guide