Cyber Security – The practice of protecting critical systems and sensitive information from digital attacks.
Network Security – The policies, processes and practices adopted to prevent, detect and monitor unauthorized access or changes.
Ransomware – A type of malicious software designed to block access to a computer system until a sum of money is paid.
Malware – Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Anti-virus – A Software designed to detect and destroy computer viruses.
Cloud Services – A service made available to users on demand via the Internet.
Patch Management – Acquiring, testing and installing security patches.
Phishing – The fraudulent practice of sending emails purporting to be from reputable individuals or companies in order to induce individuals to reveal personal information.
Multi-factor authentication – Authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism.
Hardware – The physical elements that make up a computer or electronic system and everything else involved that is physically tangible.
Software – The programs and other operating information used by a computer.
Back-up – An extra copy of data from a computer stored at an alternate location, so it can be recovered in case of accidental deletion or corruption.
Data Recovery – The process of restoring data that has been lost, accidentally deleted, corrupted or made inaccessible.
Disaster Recovery – An organization’s ability to respond to and recover from an event that negatively affects business operations.
Network Integrations – Combining different hardware and software components into an integrated network system.
Cyber Resilience – The ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises.
Threat management – A process used to prevent, identify and respond to cyber attacks with speed and accuracy.
Security management – The identification of an organization’s assets, followed by the development, documentation, and implementation of policies and procedures for protecting assets.
Download – copying data from one computer system to another, typically over the internet.
Upload – Transferring data from one computer system to another.
Wireless – Using radio, microwaves, etc. as opposed to wires or cables to transmit signals.
Proactive Monitoring – The process of continuously searching for indicators that would alert to a potential problem.
Technical Support – A service which offers help and advice to technology users.
Server – A device which manages access to a centralized resource in a network.
Switch – A high-speed device that receives and forwards data to its respective destination on a local area network.
Router – a device that connects a local network to the internet, and manages the movement of data.
Local Area Network – a computer network that links devices within a building or group of adjacent buildings.
Access point – A networking device that allows other wireless devices to connect to a wired network.
Wi-Fi – The wireless technology used to connect computers, tablets, smartphones and other devices to the internet by radio waves.
Bandwidth – The maximum amount of data transmitted over an internet connection in a given amount of time.
Operating System – software that supports a computer’s basic functions, such as scheduling tasks, executing applications, and controlling peripherals.
Computer Peripherals – A device connected to a computer to provide communication and additional functionality. Ex. Mouse, Keyboard, Monitor etc.
Microsoft Windows – An operating system developed by Microsoft.
Email – Messages distributed by electronic means from one computer user to one or more recipients via a network.
Laptops – Portable computers that you can take with you and use in different environment.
Computers – A programable, electronic device for storing and processing data.
NIC (Network Interface Controller) – a hardware component that connects a computer to a network.
RAM (Random Access Memory / Computer Memory) – a device’s short-term memory – a computer will temporarily store data for ongoing operations while the computer is turned on and running.
Hard Drive – A computer’s long-term memory. The location of where the Operating System, all installed applications and data reside.
Phone Systems – A communication system that transmits sound between distant points.
VOIP / IP Telephony (Voice over Internet Protocol) – technologies for the delivery of voice communications over the Internet.
Monitor / Displays – Device that displays information in pictorial or text form.
Network – Two or more devices sharing resources.
VPN (Virtual private network) – Extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
Encryption – The process of concealing information, to prevent unauthorized access.
Remote Desktop – A software or operating system feature that allows a personal computer to access a desktop environment remotely.
MSP (Managed Service provider) – A third-party company that remotely manages a customer’s technological infrastructure and end-user systems.
UPS (Uninterruptible power supply) – Electrical device that will self-activate in the event of a power disruption and function as the primary power source.
Authentication – The process of verifying one’s identity.
Login – Entering a combination of username and password to gain access to a system or device.
Credentials – Refer to pieces of identification. In computing, this generally equates to a username and password combination.
Endpoint – Any device which is part of a computer network.
SOC (Security Operations Centre) – A group or unit of individuals who deal with security on an organizational and technical level.
NOC (Network Operations Centre) – A group or unit of individuals who monitor, maintain and manage a Network or group of networks.
EDR (Endpoint Detection and Response) – A type of technology that continually monitors the device for cyber threats.
MDR (Managed Detection and Response) – A service that monitors and provides intrusion detection of malware or unauthorized activity on your network and assists in rapid response to eliminate those threats.
XDR – A combination of both EDR and MDR technology and service.