Not everybody can be an IT expert and for everyday IT users, many of even the most basic terms being thrown around can leave you confused and a bit stumped! Many of our customers have told us about the terms that they have found a bit baffling, so with this in mind, we have created the handy go-to jargon buster below…
IP Address
An Internet Protocol address (IP address) is a numerical label that is given to a device and is almost like a telephone number for your computer. An IP address serves two main functions: network interface identification and location setting.
Cloud Computing
Cloud computing allows businesses to store, access and interact with data over the internet rather than through a local network. Businesses use this to keep onsite storage costs down and to help keep data safe and secure through a dedicated cloud storage company. The main purpose of cloud storage is to keep data easily accessible to all users.
Phishing
This is a method that hackers use to trick people into giving them data, access to their system or credentials. Phishing often involves creating a fake website or email with malicious links or code attached. It is vital that you and your staff understand how best to identify and avoid any phishing emails.
Ransomware
Ransomware is a type of malware, or malicious software, that locks up a victim’s data or computing device and threatens to keep it locked — or worse — unless the victim pays the attacker a ransom.
Malware
Malware is software that is specifically designed to disrupt, damage, or gain unauthorised access to a computer system.
Firewall
In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
MFA – Multi-Factor Authentication
Multi-factor Authentication (MFA) is an authentication method that requires the user to provide two or more verification factors to gain access to a resource such as an application, online account, or a VPN. MFA is a core component of a strong Identity and Access Management (IAM) policy. Another way to refer to this, is that the first authentication is something you know, i.e. a password and the second is something you have such as a mobile phone handset that will generate a code.
VPN
VPN stands for "Virtual Private Network" and describes the opportunity to establish a protected network connection when using public networks. VPNs encrypt your internet traffic and disguise your online identity. This makes it more difficult for third parties to track your activities online and steal data.
Wi-Fi
A technology that allows devices to connect to a network using radio waves and without the need for any cables. The term Wi-Fi is a unique term that the Wi-Fi Alliance has trademarked. You would need a wireless device in order to connect to a WiFi network.