SYDNIC icon blue

Cyber Security – The practice of protecting critical systems and sensitive information from digital attacks.

Network Security – The policies, processes and practices adopted to prevent, detect and monitor unauthorized access or changes.

Ransomware – A type of malicious software designed to block access to a computer system until a sum of money is paid.

Malware – Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

Anti-virus – A Software designed to detect and destroy computer viruses.

Cloud Services – A service made available to users on demand via the Internet.

Patch Management – Acquiring, testing and installing security patches.

Phishing – The fraudulent practice of sending emails purporting to be from reputable individuals or companies in order to induce individuals to reveal personal information.

Multi-factor authentication – Authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism.

Hardware – The physical elements that make up a computer or electronic system and everything else involved that is physically tangible.

Software – The programs and other operating information used by a computer.

Back-up – An extra copy of data from a computer stored at an alternate location, so it can be recovered in case of accidental deletion or corruption.

Data Recovery – The process of restoring data that has been lost, accidentally deleted, corrupted or made inaccessible.

Disaster Recovery – An organization’s ability to respond to and recover from an event that negatively affects business operations.

Network Integrations – Combining different hardware and software components into an integrated network system.

Cyber Resilience – The ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises.

Threat management – A process used to prevent, identify and respond to cyber attacks with speed and accuracy.

Security management – The identification of an organization’s assets, followed by the development, documentation, and implementation of policies and procedures for protecting assets.

Download – copying data from one computer system to another, typically over the internet.

Upload – Transferring data from one computer system to another.

Wireless – Using radio, microwaves, etc. as opposed to wires or cables to transmit signals.

Proactive Monitoring – The process of continuously searching for indicators that would alert to a potential problem.

Technical Support – A service which offers help and advice to technology users.

Server – A device which manages access to a centralized resource in a network.

Switch – A high-speed device that receives and forwards data to its respective destination on a local area network.

Router – a device that connects a local network to the internet, and manages the movement of data.

Local Area Network – a computer network that links devices within a building or group of adjacent buildings.

Access point – A networking device that allows other wireless devices to connect to a wired network.

Wi-Fi – The wireless technology used to connect computers, tablets, smartphones and other devices to the internet by radio waves.

Bandwidth – The maximum amount of data transmitted over an internet connection in a given amount of time.

Operating System – software that supports a computer’s basic functions, such as scheduling tasks, executing applications, and controlling peripherals.

Computer Peripherals – A device connected to a computer to provide communication and additional functionality. Ex. Mouse, Keyboard, Monitor etc.

Microsoft Windows – An operating system developed by Microsoft.

Email – Messages distributed by electronic means from one computer user to one or more recipients via a network.

Laptops – Portable computers that you can take with you and use in different environment.

Computers – A programable, electronic device for storing and processing data.

NIC (Network Interface Controller) – a hardware component that connects a computer to a network.

RAM (Random Access Memory / Computer Memory) – a device’s short-term memory – a computer will temporarily store data for ongoing operations while the computer is turned on and running.

Hard Drive – A computer’s long-term memory. The location of where the Operating System, all installed applications and data reside.

Phone Systems – A communication system that transmits sound between distant points.

VOIP / IP Telephony (Voice over Internet Protocol) –   technologies for the delivery of voice communications over the Internet.

Monitor / Displays – Device that displays information in pictorial or text form.

Network – Two or more devices sharing resources.

VPN (Virtual private network) – Extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

Encryption – The process of concealing information, to prevent unauthorized access.

Remote Desktop – A software or operating system feature that allows a personal computer to access a desktop environment remotely.

MSP (Managed Service provider) – A third-party company that remotely manages a customer’s technological infrastructure and end-user systems.

UPS (Uninterruptible power supply) – Electrical device that will self-activate in the event of a power disruption and function as the primary power source.

Authentication – The process of verifying one’s identity.

Login – Entering a combination of username and password to gain access to a system or device.

Credentials – Refer to pieces of identification. In computing, this generally equates to a username and password combination.

Endpoint – Any device which is part of a computer network.

SOC (Security Operations Centre) – A group or unit of individuals who deal with security on an organizational and technical level.

NOC (Network Operations Centre) – A group or unit of individuals who monitor, maintain and manage a Network or group of networks.

EDR (Endpoint Detection and Response) – A type of technology that continually monitors the device for cyber threats.

MDR (Managed Detection and Response) – A service that monitors and provides intrusion detection of malware or unauthorized activity on your network and assists in rapid response to eliminate those threats.

XDR – A combination of both EDR and MDR technology and service.

Let SYDNIC be an extension of your team.