The Zentech glossary of cybersecurity terms

The Zentech glossary of cybersecurity terms

Understanding IT jargon can be daunting. And when you ask IT experts to explain a particular technical term, you might end up getting more confused if they explain it using terms you’ve never heard of.

While it’s impossible to learn every single IT jargon there is, it certainly won’t hurt to familiarize yourself with some commonly used technology terms.

Here’s a list of words that might come up when discussing your IT needs with a managed services provider.

Anti-malware

Anti-malware is a tool designed to protect your systems from would-be attacks. It has the ability to trace, quarantine, and remove malicious software that may damage computer systems and compromise data.

Business continuity plan (BCP)

A business continuity plan (BCP) is a plan that ensures operations continue in the event of cyberattacks or disasters and emergencies such as earthquakes, fires, floods, and power interruptions, which could affect normal business activity. When developing a BCP, businesses must ensure that their plan takes into account risk assessments, damage control analyses, and data backup. It saves a business from losing data in case of a disaster.

Cloud computing

Cloud computing, also referred to as the cloud, is the use and delivery of services like data storage, software development platforms, productivity tools, and networking over the internet. Using cloud computing helps businesses to save on costs, scale easily, and increase security and productivity.

Data management

Data management is an organization’s method of storing, backing up, securing, accessing, and managing information. It also involves setting up data governance policies and identifying data sources to check for safety and data integrity.

Encryption

Encryption is the process of scrambling information in a way that makes it unreadable, so that only authorized recipients can access it. When encrypted, data such as passwords, financial account numbers, personal or health information can only be accessed by those who possess an encryption key. Encryption is an often overlooked cybersecurity measure that could help prevent data breaches if more organizations enabled it.

Network monitoring

Network monitoring involves evaluating the health of your network, often through the use of software and systems that detect faulty components like frozen servers, defective routers, or malfunctioning switches. It involves investigating the potential causes of a slow computer network, and providing necessary recommendations to remedy them.

Phishing

Phishing is a type of cybercrime done via email, phone or SMS, whereby targets are tricked into providing sensitive data such as personally identifiable information, bank account and/or credit card details, and passwords by malicious entities purporting to be legitimate.

Remote monitoring and management (RMM)

RMM is a collection of IT tools that proactively track the health status of a network or computer. RMM normally generates tickets for troubleshooting issues, conducts remote desktop monitoring, or provides self-help information in an easy-to-use interface. Reports are also automatically generated to an IT services provider so issues are resolved before they get worse.

Voice over Internet Protocol (VoIP)

VoIP is a telecommunications system that uses the internet instead of traditional telephone lines. Users are able to make or receive calls using an internet-capable device such as a VoIP-capable landline and mobile devices. It is a convenient and cost-effective way to communicate and comes with a host of features such as video conferencing, call routing or forwarding, and many more.

Zentech IT offers proactive networking solutions that help increase your cybersecurity measures against data loss. For a holistic assessment of your IT needs, contact us today!

Like This Article?

Sign up below and once a month we'll send you a roundup of our most popular posts