BlogKnowledgeUncategorized

Cyber Jargon Busting – Spotlight on IT Security Jargon

In Blog, Knowledge, Uncategorized on

We regularly take a look at explaining cyber jargon – often jargon busting across the cyber and digital security industry for company Directors, Managers and CEO’s. Here Security specialist John Hay helps us navigate some regularly used IT security jargon.

If you have a request for our consultancy team to publish a helpful, plain English blog to help keep things simple, get in touch. Our team love to help.

What is a Pen Test?

Penetration testing, often referred to as a ‘Pen test’ is a method of testing, measuring and enhancing established security measures. Penetration tests are used to identify the level of technical risk emanating from software and hardware vulnerabilities. Best run on a regular basis, how you evidence your testing can also impact on fines incurred by the ICO should you experience a breach.

What is Phishing?

Phishing, often referred to as being ‘hacked’  is when cyber criminals attempt to infiltrate your systems to obtain information they should not be in possession of. Using email, social media, instant messaging, texting, and infected websites an attacker will try and obtain information, often personal or confidential data. Attackers target users’ login credentials, financial information, company data, and anything that could be of value.

What is Ethical Hacking ?

Ethical hacking is often contracted by organisations who want to test their security levels and understand their risk level from Phishing. Using a variety of methods to gain entry to a system or network using un-malicious methods with the aim of subsequently identify and then fixing the vulnerability. Be assured of credentials that demonstrate s supplier is truly an Ethical Hacker is critical. Certification such as Cyber Essentials Plus is an indicator of authenticity.

What is Malware?

Malware is an abbreviation of malicious software. Computer programs designed to infiltrate and cause damage without the users consent. Malware is a term covering all the different types of threats to your computer safety such as viruses, worms, spyware, trojans, rootkits etc. Security specialists can test to give you assurance if any Malware existing within your systems. Often IT companies that doe not hold security accreditation are also unable to trace Malware. Net-Defence regularly supports IT support companies with security specialist support.

Slow activity can often be an indicator

you may have a hidden issue.

What is a VPN ?

VPN stands for ‘Virtual Private Network’. It is best practice for installing on mobile devices as it extends a corporate network through encrypted connections made over the Internet. This means that your information such as email, documents and data remain protected when you or your team work remotely.

What is a Firewall ?

A Firewall makes filtering decisions across your IT systems to determine whether data is allowed to pass through to the end user. These decisions are often based on rules established by the administrator when setting up the computer and firewall. It can protect your business from Phishing.

What does Encryption mean?

The translation of data into a secret code. This protects files and data during transmission between team members wokring remotely and or between your company and external contacts.

What is DDOS ?

DDOS is short for ‘Distributed Denial of Service’. A denial of service is a deliberate cyber-attack that floods a computer system with so much data that it is slowed down or forced offline. Slow activity can often be an indicator you may have a hidden issue.

What is Ransomeware ?

Ransomware is a form of Malware. Once on your computer it denies you access to your data. The attacker demands a ransom promising to restore access to the data upon payment. Ransomeware is being experienced by a growing number of small companies and charities, it’s not exclusive to large enterprises.