The more you know about the ways cyber thieves use technology for evil, the better prepared you’ll be to identify phishing scams before falling hook, line and sinker. Ooma shares a helpful glossary of cyber-security terms, including many phishing variants, some examples to show how they work and tips to avoid cyberattacks.