Technical jargon busted
Technology and computing are advancing so fast that keeping up can be tedious. It sometimes feels like you’re falling out of touch. New words you aren’t familiar keep popping up in your industry. But, the problem isn’t with you. In fact, a lot of the concepts would be much easier to understand with a little explanation from the people using them. We’ve put together this list of common technical jargon that you should know, so you can keep your business safe both on and offline.
This refers to the collection of regular data on how your IT systems are functioning. We use software to collect data regularly so that any unplanned downtime, cyber attacks, or overloading of the system can be highlighted instantly. Your IT support company will be notified of any problems so they can fix them immediately. This reduces any losses in profits to your business as a result of attacks, downtime, or inefficient hardware and software.
What is the cloud? Where is the cloud? These are some commonly asked questions by those who hear the term cloud computing everywhere, but rarely an explanation. Cloud computing means that you are storing and accessing data and programmes via the internet. This is instead of using your computer’s hard drive. Before cloud computing, to access a particular piece of software or data, you would have needed to be using the computer where these files were stored. Now, cloud computing means you can access everything you need to work from anywhere, on any device.
In its simplest form, a cyber attack is an attempt by hackers to damage, destroy, or steal from a computer system. But, there are many different strategies that these attackers use to try and ruin your business.
- Malware: A piece of code written with the malicious intent of stealing data or destroying something on a computer. These include Trojans, viruses, and worms which hackers send via email attachments, software downloads or operating system vulnerabilities.
- Phishing - Often sent via email, these ask you to provide sensitive data such as bank details, often posing as legitimate companies.
- Password attacks - Hackers gain access to your systems by cracking your password.
- Denial-of-service attacks - Attackers send high volumes of traffic through your network so it becomes overloaded and can no longer function. This is rare in medium-small companies.
- Man in the middle attacks - The interception of sensitive data by impersonating the end website or device where the information is to be sent.
This is the process of preventing cyber attacks to save you from economic and legal repercussions. We use a variety of methods to stop cyber attacks including anti-virus and anti-malware software, VPNs, infrastructure monitoring, online security monitoring, creating strong passwords, and being careful to not click or interact with any suspicious links, adverts, or emails.
Understanding IT terms is helpful, but certainly not essential for the protection of your business. That’s why professionals like us at Tandem are here. We will make sure everything you need to protect your business is in place so you don’t have to worry about a thing. Why not start today by getting in touch with us on 01204 860050.